首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
A multi-channel steganographic protocol for secure SMS mobile banking 安全短信移动银行的多通道隐写协议
Omego Obinna, E. Pfluegel, Charles A. Clarke, M. Tunnicliffe
The advancement in mobile technologies and wireless communications has led to a rapidly growing number of users benefiting from mobile banking services. SMS banking offers a convenient mobile banking solution which is easy to implement and frequently used in many parts of the world. However, it is only viable under the assumption of secure SMS services. In this paper, a novel secure SMS banking protocol is proposed. The approach is based on a multi-channel security protocol combining low and high entropy steganography. One of the distinct advantages of this protocol is its confidentiality property against the mobile phone operator which, to our knowledge, is a novel feature. Furthermore, the required architecture is simple and only involves GSM services and one additional internet connection which can be insecure. As such it offers security, low deployment costs and would be suitable for example in rural areas or countries without individual secure home internet connections.
移动技术和无线通信的进步使得受益于移动银行服务的用户数量迅速增长。短信银行提供了一种方便的移动银行解决方案,易于实施,在世界许多地方经常使用。然而,它只有在安全短信服务的假设下才可行。本文提出了一种新的安全短信银行协议。该方法基于一种多通道安全协议,结合了低熵和高熵隐写。该协议的一个明显优点是其对移动电话运营商的保密性,据我们所知,这是一个新颖的特性。此外,所需的架构很简单,只涉及GSM服务和一个可能不安全的额外互联网连接。因此,它提供了安全性,低部署成本,适用于农村地区或没有个人安全家庭互联网连接的国家。
{"title":"A multi-channel steganographic protocol for secure SMS mobile banking","authors":"Omego Obinna, E. Pfluegel, Charles A. Clarke, M. Tunnicliffe","doi":"10.23919/ICITST.2017.8356393","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356393","url":null,"abstract":"The advancement in mobile technologies and wireless communications has led to a rapidly growing number of users benefiting from mobile banking services. SMS banking offers a convenient mobile banking solution which is easy to implement and frequently used in many parts of the world. However, it is only viable under the assumption of secure SMS services. In this paper, a novel secure SMS banking protocol is proposed. The approach is based on a multi-channel security protocol combining low and high entropy steganography. One of the distinct advantages of this protocol is its confidentiality property against the mobile phone operator which, to our knowledge, is a novel feature. Furthermore, the required architecture is simple and only involves GSM services and one additional internet connection which can be insecure. As such it offers security, low deployment costs and would be suitable for example in rural areas or countries without individual secure home internet connections.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Designing an assembly language using MIT App inventor 使用MIT App inventor设计一个汇编语言
Casey Wilson, Anna V. Sandifer, Aspen Olmsted
Many methods for learning software development neglect computer science concepts for real-world application based education. We combine one computer science concept, hardware-software interaction, and apply it in a software development context using MIT App Inventor. Through App Inventor we have created a virtual computer, implemented with its own binary machine language and assembly language. We hope that students using App Inventor to learn software development by creating apps, use our implementation to learn assembly language concepts by adjusting our languages and virtual hardware for their own purposes and interests. This serves both to help them understand a core computer science concept and to present the concept in a way that encourages practical software development skill improvement.
许多学习软件开发的方法忽视了基于现实世界应用的教育的计算机科学概念。我们结合了一个计算机科学概念,硬件-软件交互,并将其应用于使用MIT App Inventor的软件开发环境中。通过App Inventor,我们创建了一个虚拟计算机,用自己的二进制机器语言和汇编语言实现。我们希望学生使用App Inventor通过创建应用程序来学习软件开发,使用我们的实现通过调整我们的语言和虚拟硬件来学习汇编语言概念,以满足自己的目的和兴趣。这既可以帮助他们理解核心计算机科学概念,又可以以一种鼓励实际软件开发技能改进的方式来呈现这个概念。
{"title":"Designing an assembly language using MIT App inventor","authors":"Casey Wilson, Anna V. Sandifer, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356457","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356457","url":null,"abstract":"Many methods for learning software development neglect computer science concepts for real-world application based education. We combine one computer science concept, hardware-software interaction, and apply it in a software development context using MIT App Inventor. Through App Inventor we have created a virtual computer, implemented with its own binary machine language and assembly language. We hope that students using App Inventor to learn software development by creating apps, use our implementation to learn assembly language concepts by adjusting our languages and virtual hardware for their own purposes and interests. This serves both to help them understand a core computer science concept and to present the concept in a way that encourages practical software development skill improvement.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115449099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database multi-factor authentication via pluggable authentication modules 通过可插拔的身份验证模块进行数据库多因素身份验证
Cameron Hamilton, Aspen Olmsted
Authentication schemes containing single factors are becoming increasingly inadequate for many applications. This paper describes the use of Pluggable Authentication Modules as a means of creating a multi-factor authentication scheme for a MySQL database. The resulting scheme is one with a significantly higher degree of security.
对于许多应用来说,包含单一因素的身份验证方案越来越不适合。本文描述了使用Pluggable身份验证模块为MySQL数据库创建多因素身份验证方案的方法。得到的方案具有明显更高的安全性。
{"title":"Database multi-factor authentication via pluggable authentication modules","authors":"Cameron Hamilton, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356421","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356421","url":null,"abstract":"Authentication schemes containing single factors are becoming increasingly inadequate for many applications. This paper describes the use of Pluggable Authentication Modules as a means of creating a multi-factor authentication scheme for a MySQL database. The resulting scheme is one with a significantly higher degree of security.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Classifying influenza outbreaks by analyzing and filtering Twitter data 通过分析和过滤Twitter数据对流感爆发进行分类
Elizabeth Healy, Husna Siddiqui, Aspen Olmsted
This paper uses twitter streaming and filtering techniques to determine which cities the flu is most prevalent in real time. The Twitter streaming API was used to collect data and filter using keywords and location. Our results show that more heavily populated cities have more cases of the flu.
本文使用twitter流媒体和过滤技术来实时确定流感最流行的城市。Twitter流API用于收集数据并使用关键字和位置进行过滤。我们的研究结果表明,人口越稠密的城市,流感病例越多。
{"title":"Classifying influenza outbreaks by analyzing and filtering Twitter data","authors":"Elizabeth Healy, Husna Siddiqui, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356381","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356381","url":null,"abstract":"This paper uses twitter streaming and filtering techniques to determine which cities the flu is most prevalent in real time. The Twitter streaming API was used to collect data and filter using keywords and location. Our results show that more heavily populated cities have more cases of the flu.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"21 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid approach for femtocell co-tier interference mitigation 一种用于减少飞蜂窝共层干扰的混合方法
A. Alotaibi, M. Angelides
This paper presents a hybrid technique for mitigating co-tier interference between Femtocell Access Points (FAPs). This technique combines indoor deployment and cluster-based resource allocation. This requires estimation of the number of femtocell access points and their deployment locations to achieve the optimum coverage and distributing the spectrum fairly across the resulting cluster in relation to the number of users. The cluster head is selected in relation to the number of neighbouring FAPs and the distance between FAPs. Our simulation results show that both the coverage and capacity are significantly increased, the outage probability is significantly reduced, and most importantly co-tier interference is mitigated.
本文提出了一种减少飞蜂窝接入点(FAPs)间共层干扰的混合技术。这种技术结合了室内部署和基于集群的资源分配。这就需要估计飞蜂窝接入点的数量及其部署位置,以实现最佳覆盖,并在由此产生的群集中相对于用户数量公平地分配频谱。簇头是根据邻近fap的数量和fap之间的距离来选择的。仿真结果表明,该方法不仅显著提高了网络的覆盖范围和容量,而且显著降低了网络中断的概率,最重要的是降低了协层干扰。
{"title":"A hybrid approach for femtocell co-tier interference mitigation","authors":"A. Alotaibi, M. Angelides","doi":"10.23919/ICITST.2017.8356366","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356366","url":null,"abstract":"This paper presents a hybrid technique for mitigating co-tier interference between Femtocell Access Points (FAPs). This technique combines indoor deployment and cluster-based resource allocation. This requires estimation of the number of femtocell access points and their deployment locations to achieve the optimum coverage and distributing the spectrum fairly across the resulting cluster in relation to the number of users. The cluster head is selected in relation to the number of neighbouring FAPs and the distance between FAPs. Our simulation results show that both the coverage and capacity are significantly increased, the outage probability is significantly reduced, and most importantly co-tier interference is mitigated.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115872047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure e-mail communication — Comparison and selection of encryption solutions using an utility value analysis approach 安全电子邮件通信。使用效用价值分析方法的加密解决方案的比较和选择
D. Fischer, B. Markscheffel, K. Scherr
E-mail is one of the most frequently used means of communication. Confidentiality, integrity and authenticity are often indispensable in e-mail communication, especially in business use. However, these security objectives can only be guaranteed with the help of additional encryption solutions. Today, there are a variety of client, gateway and software-as-a-service solutions for e-mail encryption. Companies are faced with the challenge of finding the most suitable solution for them. Our research work presents findings from a utility value analysis which provides a comprehensive process for selecting an appropriate solution for securing e-mail traffic. We present the basic principles behind the utility value analysis and how it is used for the evaluation and selection process of e-mail encryption solutions. In addition, we document how our methodology was applied in a practice-based project to make a selection decision between six existing encryption solutions.
电子邮件是最常用的通信手段之一。机密性、完整性和真实性在电子邮件通信中通常是不可缺少的,尤其是在商业使用中。然而,这些安全目标只能在额外加密解决方案的帮助下才能得到保证。今天,有各种各样的客户端、网关和软件即服务解决方案用于电子邮件加密。企业面临着寻找最适合自己的解决方案的挑战。我们的研究工作提出了效用价值分析的结果,该分析为选择适当的解决方案以保护电子邮件流量提供了一个全面的过程。我们介绍了效用值分析背后的基本原则,以及如何将其用于电子邮件加密解决方案的评估和选择过程。此外,我们还记录了如何将我们的方法应用于基于实践的项目中,以便在六个现有加密解决方案之间做出选择决策。
{"title":"Secure e-mail communication — Comparison and selection of encryption solutions using an utility value analysis approach","authors":"D. Fischer, B. Markscheffel, K. Scherr","doi":"10.23919/ICITST.2017.8356439","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356439","url":null,"abstract":"E-mail is one of the most frequently used means of communication. Confidentiality, integrity and authenticity are often indispensable in e-mail communication, especially in business use. However, these security objectives can only be guaranteed with the help of additional encryption solutions. Today, there are a variety of client, gateway and software-as-a-service solutions for e-mail encryption. Companies are faced with the challenge of finding the most suitable solution for them. Our research work presents findings from a utility value analysis which provides a comprehensive process for selecting an appropriate solution for securing e-mail traffic. We present the basic principles behind the utility value analysis and how it is used for the evaluation and selection process of e-mail encryption solutions. In addition, we document how our methodology was applied in a practice-based project to make a selection decision between six existing encryption solutions.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated course management system 自动化课程管理系统
Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Das, M. Mustafa, M. R. Bari
Recent developments in computer networks and communications have brought a great change in the E-learning and course management systems. This change has brought the teachers and the learners closer than they were ever before. The traditional teaching methods have been getting replaced by the new technologies and methods. In E-learning, in particular, the course management system plays an important role. As the availability of internet has increased, people have become even more dependent on it. In that context of development, the course management system should be designed in such a way so that the users experience less complexity while using the same. In our work, a hassle-free technique to design a course management system where all the facilities and services needed by the stakeholders are accessible at one place, has been proposed. Stating from the classroom creation to manage and maintain the classroom have been made even more easier and secured.
近年来计算机网络和通信技术的发展给电子学习和课程管理系统带来了巨大的变化。这种变化使老师和学生比以往任何时候都更接近。传统的教学方法已被新的技术和方法所取代。特别是在E-learning中,课程管理系统起着重要的作用。随着互联网可用性的增加,人们变得更加依赖它。在开发的背景下,课程管理系统应该以这样一种方式设计,以便用户在使用相同的过程中体验较少的复杂性。在我们的工作中,我们提出了一种设计课程管理系统的无障碍技术,在该系统中,利益相关者所需的所有设施和服务都可以在一个地方访问。从教室的创建到教室的管理和维护都变得更加容易和安全。
{"title":"Automated course management system","authors":"Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Das, M. Mustafa, M. R. Bari","doi":"10.23919/ICITST.2017.8356369","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356369","url":null,"abstract":"Recent developments in computer networks and communications have brought a great change in the E-learning and course management systems. This change has brought the teachers and the learners closer than they were ever before. The traditional teaching methods have been getting replaced by the new technologies and methods. In E-learning, in particular, the course management system plays an important role. As the availability of internet has increased, people have become even more dependent on it. In that context of development, the course management system should be designed in such a way so that the users experience less complexity while using the same. In our work, a hassle-free technique to design a course management system where all the facilities and services needed by the stakeholders are accessible at one place, has been proposed. Stating from the classroom creation to manage and maintain the classroom have been made even more easier and secured.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of AV systems against modern malware 针对现代恶意软件的AV系统评估
Abidullah Zarghoon, I. Awan, Jules Pagna Disso, Richard Dennis
Countering the proliferation of malware has been for recent years one of the top priorities for governments, businesses, critical infrastructure, and end users. Despite the apparent evolvement of anti-virus (AV) systems, malicious authors have managed to create a sense of insecurity amongst computer users. Security controls do not appear to be sufficiently strong to stop malware proliferating. There seems to be a disconnect between public reports on AV tests and what people are experiencing on the daily basis. In this research, we are testing the efficiency of AV products and their ability to detect malicious files commonly known as malware. We manually generated payloads from five malware frameworks freely available to download and use. We use two modes of tests during our experiments. We manually installed a selection of AV systems in one first instance. We also use an online framework for testing malicious files. The findings in this study show that many antivirus systems were not able to achieve a higher score than 80% detection rate. Certain attack frameworks were much more successful in generating payloads that were not detectable by AV systems. We conclude that AV systems have their roles to play as they are the most common first line of defense, but more work is needed to successfully detect most malware the first day of their release.
近年来,对抗恶意软件的扩散一直是政府、企业、关键基础设施和最终用户的首要任务之一。尽管反病毒(AV)系统有了明显的发展,但恶意作者已经设法在计算机用户中制造了一种不安全感。安全控制似乎不足以阻止恶意软件的扩散。关于AV检测的公开报告与人们日常经历的情况之间似乎存在脱节。在这项研究中,我们正在测试反病毒产品的效率及其检测恶意文件的能力。我们从五个免费下载和使用的恶意软件框架中手动生成有效负载。我们在实验中使用了两种测试模式。我们在第一个实例中手动安装了一系列AV系统。我们还使用在线框架来测试恶意文件。本研究的结果表明,许多防病毒系统无法达到高于80%的检测率。某些攻击框架在生成AV系统无法检测到的有效载荷方面要成功得多。我们的结论是,反病毒系统有其作用,因为它们是最常见的第一道防线,但要在大多数恶意软件发布的第一天成功检测到它们,还需要做更多的工作。
{"title":"Evaluation of AV systems against modern malware","authors":"Abidullah Zarghoon, I. Awan, Jules Pagna Disso, Richard Dennis","doi":"10.23919/ICITST.2017.8356397","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356397","url":null,"abstract":"Countering the proliferation of malware has been for recent years one of the top priorities for governments, businesses, critical infrastructure, and end users. Despite the apparent evolvement of anti-virus (AV) systems, malicious authors have managed to create a sense of insecurity amongst computer users. Security controls do not appear to be sufficiently strong to stop malware proliferating. There seems to be a disconnect between public reports on AV tests and what people are experiencing on the daily basis. In this research, we are testing the efficiency of AV products and their ability to detect malicious files commonly known as malware. We manually generated payloads from five malware frameworks freely available to download and use. We use two modes of tests during our experiments. We manually installed a selection of AV systems in one first instance. We also use an online framework for testing malicious files. The findings in this study show that many antivirus systems were not able to achieve a higher score than 80% detection rate. Certain attack frameworks were much more successful in generating payloads that were not detectable by AV systems. We conclude that AV systems have their roles to play as they are the most common first line of defense, but more work is needed to successfully detect most malware the first day of their release.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123737993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Three factor authentication 三因素认证
W. Kennedy, Aspen Olmsted
Authentication, security, and confidentiality are some of the most important topics of cyber security. There have been many solutions presented to users for strengthening the security of login password-based authentication methods. Primarily this has been through the use of two-factor authentication methods. Two-factor authentication is the combination of single factor authentication mechanisms. The growing popularity and acceptance of two-factor methods are driven by the increasing need for privacy and security in this technological age. The success and popularity of adapted security measures are largely dependent on their ease of implementation and convenience to the user. The focus of this research is to address and analyze the implications of using a three-factor authentication model for added security in websites and mobile apps. This paper will present an app we created which could provide a potential method for three-factor authentication that could potentially ensure added authentication assurances without loss of convenience.
身份验证、安全性和机密性是网络安全的一些最重要的主题。为了增强基于密码的登录认证方法的安全性,已经向用户提出了许多解决方案。这主要是通过使用双因素身份验证方法实现的。双因素身份验证是单因素身份验证机制的组合。在这个技术时代,对隐私和安全的需求日益增长,推动了双因素方法的日益普及和接受。适应性安全措施的成功和普及在很大程度上取决于其实现的便利性和对用户的便利性。本研究的重点是解决和分析使用三因素身份验证模型在网站和移动应用程序中增加安全性的影响。本文将介绍我们创建的一个应用程序,它可以提供一种潜在的三因素身份验证方法,可以在不损失便利性的情况下潜在地确保添加身份验证保证。
{"title":"Three factor authentication","authors":"W. Kennedy, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356384","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356384","url":null,"abstract":"Authentication, security, and confidentiality are some of the most important topics of cyber security. There have been many solutions presented to users for strengthening the security of login password-based authentication methods. Primarily this has been through the use of two-factor authentication methods. Two-factor authentication is the combination of single factor authentication mechanisms. The growing popularity and acceptance of two-factor methods are driven by the increasing need for privacy and security in this technological age. The success and popularity of adapted security measures are largely dependent on their ease of implementation and convenience to the user. The focus of this research is to address and analyze the implications of using a three-factor authentication model for added security in websites and mobile apps. This paper will present an app we created which could provide a potential method for three-factor authentication that could potentially ensure added authentication assurances without loss of convenience.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122400684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services 从电子政务到云政务:约旦公民接受公共服务的挑战
A. Alkhwaldi, M. Kamala, R. Qahwaji
On the inception of the third millennium, there is much evidence that cloud technologies have become the strategic trend for many governments, not only for developed countries (e.g. the UK, Japan and the USA), but also developing countries (e.g. Malaysia and countries in the Middle East region). These countries have launched cloud computing movements for enhanced standardization of IT resources, cost reduction and more efficient public services. Cloud-based e-government services are considered to be one of the high priorities for government agencies in Jordan. Although experiencing phenomenal evolution, government cloud-services are still suffering from the adoption challenges of e-government initiatives (e.g. technological, human, social and financial aspects) which need to be considered carefully by governments contemplating their implementation. While e-government adoption from the citizens' perspective has been extensively investigated using different theoretical models, these models have not paid adequate attention to security issues. This paper presents a pilot study to investigate citizens' perceptions of the extent to which these challenges inhibit the acceptance and use of cloud computing in the Jordanian public sector and examine the effect of these challenges on the security perceptions of citizens. Based on the analysis of data collected from online surveys, some important challenges were identified. The results can help to guide successful acceptance of cloud-based e-government services in Jordan.
在第三个千年的开端,有很多证据表明,云技术已经成为许多政府的战略趋势,不仅是发达国家(如英国、日本和美国),而且是发展中国家(如马来西亚和中东地区的国家)。这些国家开展了云计算运动,以加强信息技术资源的标准化,降低成本,提高公共服务效率。基于云的电子政务服务被认为是约旦政府机构的高度优先事项之一。虽然经历了惊人的发展,但政府云服务仍然受到电子政务计划的采用挑战(例如技术、人力、社会和财务方面)的影响,政府在考虑实施时需要仔细考虑这些挑战。虽然从公民的角度对电子政务的采用进行了广泛的研究,使用了不同的理论模型,但这些模型都没有充分重视安全问题。本文提出了一项试点研究,以调查公民对这些挑战在多大程度上阻碍了约旦公共部门接受和使用云计算的看法,并研究这些挑战对公民安全观念的影响。根据对在线调查收集的数据的分析,确定了一些重要的挑战。研究结果有助于指导约旦成功接受基于云的电子政务服务。
{"title":"From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services","authors":"A. Alkhwaldi, M. Kamala, R. Qahwaji","doi":"10.23919/ICITST.2017.8356405","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356405","url":null,"abstract":"On the inception of the third millennium, there is much evidence that cloud technologies have become the strategic trend for many governments, not only for developed countries (e.g. the UK, Japan and the USA), but also developing countries (e.g. Malaysia and countries in the Middle East region). These countries have launched cloud computing movements for enhanced standardization of IT resources, cost reduction and more efficient public services. Cloud-based e-government services are considered to be one of the high priorities for government agencies in Jordan. Although experiencing phenomenal evolution, government cloud-services are still suffering from the adoption challenges of e-government initiatives (e.g. technological, human, social and financial aspects) which need to be considered carefully by governments contemplating their implementation. While e-government adoption from the citizens' perspective has been extensively investigated using different theoretical models, these models have not paid adequate attention to security issues. This paper presents a pilot study to investigate citizens' perceptions of the extent to which these challenges inhibit the acceptance and use of cloud computing in the Jordanian public sector and examine the effect of these challenges on the security perceptions of citizens. Based on the analysis of data collected from online surveys, some important challenges were identified. The results can help to guide successful acceptance of cloud-based e-government services in Jordan.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127911025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1