A. Haque, Shantanu Kode, A. Razaque, Muder Almiani
{"title":"ConSec:用于上下文感知安全应用程序的加密策略","authors":"A. Haque, Shantanu Kode, A. Razaque, Muder Almiani","doi":"10.1109/IACS.2016.7476093","DOIUrl":null,"url":null,"abstract":"Prior to the creation of the internet, data security was the focal point when one wanted to keep electronic data secure from unauthorized agents for whom wanted to view, create, alter, and/or destroy various parts of an electronic file. Mobile security is still at the forefront of cyber warfare however, data security is progressively gaining ground and can arguably be the front runner. Since almost every device is connected to a network nowadays data security awareness has been on a drastic rise. And this has caused both the customers and manufacturers a severe concern. Research has and is currently being conducted to determine new ways to detect if malicious actions are taking place, how to discontinue said actions, and ways to prevent future malicious actions from occurring. Though manufacturers are implementing industry standard security measures, customers are not comfortable using them as they are not user friendly. So it is necessary to implement a security protocol that is well-secure, smart and can act according to the customers' needs. The main goal of this paper is not to find a new encryption protocol rather to implement an existing security protocol in an efficient way, so that customers can easily use it. In this paper we are introducing a context aware system, \"ConSec\", which encrypts and decrypts the memory according the users' usage.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"145 1","pages":"96-101"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"ConSec: An encryption policy for context aware security applications\",\"authors\":\"A. Haque, Shantanu Kode, A. Razaque, Muder Almiani\",\"doi\":\"10.1109/IACS.2016.7476093\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Prior to the creation of the internet, data security was the focal point when one wanted to keep electronic data secure from unauthorized agents for whom wanted to view, create, alter, and/or destroy various parts of an electronic file. Mobile security is still at the forefront of cyber warfare however, data security is progressively gaining ground and can arguably be the front runner. Since almost every device is connected to a network nowadays data security awareness has been on a drastic rise. And this has caused both the customers and manufacturers a severe concern. Research has and is currently being conducted to determine new ways to detect if malicious actions are taking place, how to discontinue said actions, and ways to prevent future malicious actions from occurring. Though manufacturers are implementing industry standard security measures, customers are not comfortable using them as they are not user friendly. So it is necessary to implement a security protocol that is well-secure, smart and can act according to the customers' needs. The main goal of this paper is not to find a new encryption protocol rather to implement an existing security protocol in an efficient way, so that customers can easily use it. In this paper we are introducing a context aware system, \\\"ConSec\\\", which encrypts and decrypts the memory according the users' usage.\",\"PeriodicalId\":6579,\"journal\":{\"name\":\"2016 7th International Conference on Information and Communication Systems (ICICS)\",\"volume\":\"145 1\",\"pages\":\"96-101\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 7th International Conference on Information and Communication Systems (ICICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IACS.2016.7476093\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th International Conference on Information and Communication Systems (ICICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IACS.2016.7476093","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ConSec: An encryption policy for context aware security applications
Prior to the creation of the internet, data security was the focal point when one wanted to keep electronic data secure from unauthorized agents for whom wanted to view, create, alter, and/or destroy various parts of an electronic file. Mobile security is still at the forefront of cyber warfare however, data security is progressively gaining ground and can arguably be the front runner. Since almost every device is connected to a network nowadays data security awareness has been on a drastic rise. And this has caused both the customers and manufacturers a severe concern. Research has and is currently being conducted to determine new ways to detect if malicious actions are taking place, how to discontinue said actions, and ways to prevent future malicious actions from occurring. Though manufacturers are implementing industry standard security measures, customers are not comfortable using them as they are not user friendly. So it is necessary to implement a security protocol that is well-secure, smart and can act according to the customers' needs. The main goal of this paper is not to find a new encryption protocol rather to implement an existing security protocol in an efficient way, so that customers can easily use it. In this paper we are introducing a context aware system, "ConSec", which encrypts and decrypts the memory according the users' usage.