SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "db:Swepub "

Sökning: db:Swepub

  • Resultat 2891-2900 av 1655423
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
2891.
  • Abbasi, Abdul Ghafoor, 1977- (författare)
  • CryptoNET : Generic Security Framework for Cloud Computing Environments
  • 2011
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that -               our system is guaranteed to be secure, -               it is verifiable to provide the complete set of security services, -               we prove that it always functions correctly, and -               we justify our claim that it can not be compromised without user neglect and/or consent.   We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security. In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate. At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications. Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then -               its software modules are not vulnerable to malware and viruses, -               its data are not vulnerable to illegal reading and theft, -               all messages exchanged in a networking environment are strongly protected, and -               all other resources of an application are also strongly protected.   Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use. Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems. By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications. Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected. Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently. We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system. Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions. Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure A
  •  
2892.
  • Abbasi, Abdul Ghafoor, et al. (författare)
  • Security extensions of windows environment based on FIPS 201 (PIV) smart card
  • 2011
  • Ingår i: World Congr. Internet Secur., WorldCIS. - : IEEE. - 9780956426376 ; , s. 86-92
  • Konferensbidrag (refereegranskat)abstract
    • This paper describes security extensions of various Windows components based on usage of FIPS 201 (PIV) smart cards. Compared to some other similar solutions, this system has two significant advantages: first, smart cards are based on FIPS 201 standard and not on some proprietary technology; second, smart card security extensions represent an integrated solution, so the same card is used for security of several Microsoft products. Furthermore, our smart card system uses FIPS 201 applet and middleware with smart card APIs, so it can also be used by other developers to extend their own applications with smart card functions in a Windows environment. We support the following security features with smart cards: start-up authentication (based on PIN and/or fingerprint), certificate-based domain authentication, strong authentication, and protection of local resources. We also integrated our middleware and smart cards with MS Outlook and MS Internet Explorer.
  •  
2893.
  • Abbasi, Abdul G, et al. (författare)
  • Towards a verifiable and secure data sharing platform for livestock supply chain
  • 2022
  • Ingår i: Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665462976
  • Konferensbidrag (refereegranskat)abstract
    • The digitization of a supply chain involves satisfying several functional and non-functional context specific requirements. The work presented herein builds on efforts to elicit trust and profit requirements from actors in the Swedish livestock supply chain, specifically the beef supply chain. Interviewees identified several benefits related to data sharing and traceability but also emphasized that these benefits could only be realized if concerns around data security and data privacy were adequately addressed. We developed a data sharing platform as a response to these requirements. Requirements around verifiability, traceability, secure data sharing of potentially large data objects, fine grained access control, and the ability to link together data objects was realized using distributed ledger technology and a distributed file system. This paper presents this data sharing platform together with an evaluation of its usefulness in the context of beef supply chain traceability. 
  •  
2894.
  • Abbasi, Abdul Gahafoor, et al. (författare)
  • Veidblock : Verifiable identity using blockchain and ledger in a software defined network
  • 2017
  • Ingår i: UCC 2017 Companion - Companion Proceedings of the 10th International Conference on Utility and Cloud Computing. - New York, NY, USA : Association for Computing Machinery, Inc. - 9781450351959 ; , s. 173-179
  • Konferensbidrag (refereegranskat)abstract
    • Blockchain and verifiable identities have a lot of potential in future distributed software applications e.g. smart cities, eHealth, autonomous vehicles, networks, etc. In this paper, we proposed a novel technique, namely VeidBlock 1 , to generate verifiable identities by following a reliable authentication process. These entities are managed by using the concepts of blockchain ledger and distributed through an advance mechanism to protect them against tampering. All identities created using VeidBlock approach are verifiable and anonymous therefore it preserves user’s privacy in verification and authentication phase. As a proof of concept, we implemented and tested the VeidBlock protocols by integrating it in a SDN based infrastructure. Analysis of the test results yield that all components successfully and autonomously performed initial authentication and locally verified all the identities of connected components.
  •  
2895.
  • Abbasi, Abdul Ghafoor, et al. (författare)
  • Web contents protection, secure execution and authorized distribution
  • 2010
  • Ingår i: Proceedings - 5th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2010. - 9780769541815 ; , s. 157-162
  • Konferensbidrag (refereegranskat)abstract
    • This paper describes the design and implementation of a comprehensive system for protection of Web contents. In this design, new security components and extended security features are introduced in order to protect Web contents ageist various Web attacks. Components and extended security features are: protection of Web pages using strong encryption techniques, encapsulation of Web contents and resources in PKCS#7, extended secure execution environment for Java Web Server, eXtensible Access Control Markup Language (XACML) based authorization policies, and secure Web proxy. Design and implementation of our system is based on the concepts of generic security objects and component-based architecture that makes it compatible with exiting Web infrastructures without any modification.
  •  
2896.
  • Abbasi, Alireza, et al. (författare)
  • Highly hydrated cations : Deficiency, mobility and coordination of water in crystalline nonahydrated scandium(III), yttrium(III) and lanthanoid(III) trifluoromethanesulfonate
  • 2005
  • Ingår i: Chemistry - A European Journal. - : Wiley. - 0947-6539 .- 1521-3765. ; 11:14, s. 4065-4077
  • Tidskriftsartikel (refereegranskat)abstract
    • Trivalent lanthanide-like metal ions coordinate nine water oxygen atoms, which form a tricapped trigonal prism in a large number of crystalline hydrates. Water deficiency, randomly distributed over the capping positions, was found for the smallest metal ions in the isomorphous nonahydrated trifluoromethanesulfonates, [M(H2O)(n)]CF3SO3)(3), in which M=Sc-III, Lu-III, Yb-III, Tm-III or Er-III. The hydration number n increases (n=8.0(1), 8.4(1), 8.7(1), 8.8(1) and 8.96(5), respectively) with increasing ionic size. Deuterium (H-2) solid-state NMR spectroscopy revealed fast positional exchange between the coordinated capping and prism water molecules; this exchange started at temperatures higher than about 280 K for lutetium(m) and below 268 K for scandium(m). Similar positional exchange for the fully nonahydrated yttrium(m) and lanthanum(m) compounds started at higher temperatures, over about 330 and 360 K, respectively. An exchange mechanism is proposed that can exchange equatorial and capping water molecules within the restrictions of the crystal lattice, even for fully hydrated lanthanoid(III) ions. Phase transitions occurred for all the water-deficient compounds at; 185 K. The hydrated scandium(III) trifluoromethanesulfonate transforms reversibly (Delta H degrees= -0.80(1) kJ mol(-1) on cooling) to a trigonal unit cell that is almost nine times larger, with the scandium ion surrounded by seven fully occupied and two partly occupied oxygen atom positions in a distorted capped trigonal prism. The hydrogen bonding to the trifluoromethanesulfonate anions stabilises the trigonal prism of water ligands, even for the crowded hydration sphere of the smallest metal ions in the series. Implications for the Lewis acid catalytic activity of the hydrated scandium(III) and lanthanoid(III) trifluoromethanesulfonates for organic syntheses performed in aqueous media are discussed.
  •  
2897.
  • Abbasi, Arshad Mehmood, et al. (författare)
  • Ethnobotanical survey of medicinally important wild edible fruits species used by tribal communities of Lesser Himalayas-Pakistan
  • 2013
  • Ingår i: Journal of Ethnopharmacology. - : Elsevier BV. - 0378-8741 .- 1872-7573. ; 148:2, s. 528-536
  • Tidskriftsartikel (refereegranskat)abstract
    • Ethnopharmacological relevance: Present survey was conducted to explore ethnomedicinal uses and cultural importance of wild edible fruits species by the inhabitants of Lesser Himalayas-Pakistan. Materials and methods: Information was obtained through informed consent semi-structured interviews, questionnaires, market survey, focus group conversation, unceremonious dialogue and village walks with key informants. Cultural significance of each species was calculated based on use report by participants at each study site. Results: A total of 35 wild edible fruits belonging to 21 genera and 17 families were used for the treatment of various ailments and consumed. Rosaceae was found dominating family with (8 spp.), followed by Moraceae (6 spp.), Rhamnaceae (5 spp.), Palmae and Vitaceae (2 spp. each) and remaining families were represented by one species each. Fruits (48%) were found highly utilized plant parts, followed by leaves (34%), bark, flowers and seeds (4% each), branches, latex and roots (2% each). Water was used as a medium for preparation while milk, ghee, oil, egg and butter are used for application. Modes of preparation were fall into seven categories like fresh parts eaten raw (38%), powder (24%), decoction (20%), extract (12 %), paste (4%), juice and latex (2% each). Based on cultural important index (CI) Morus nigra was found most significant species within top ten fruit plants followed by Morus alba, Olea ferruginea, Berberis lycium, Pyrus pashia, Ficus carica, Ficus palmata, Ziziphus mauritiana, Diospyros lotus and Ziziphus nummularia. Conclusions: Traditional uses of wild edible plant depend mainly on socio-economic factors rather than climatic conditions or wealth of flora. Use reports and citation demonstrated that there is a common cultural heritage regarding the gathered food plants. Further investigation is required for Antioxidant study, essential and toxic components, pharmacological applications; dietary requirements and biotechnological techniques to improve yields.(C) 2013 Elsevier Ireland Ltd. All rights reserved.
  •  
2898.
  •  
2899.
  • Abbasi, Alireza, et al. (författare)
  • N,N '-bis(2,6-dichlorobenzyl)ethylene-diimine
  • 2007
  • Ingår i: Acta Crystallographica Section E. - 1600-5368. ; 63, s. o3773-U2712
  • Tidskriftsartikel (refereegranskat)abstract
    • In the centrosymmetric title compound, C16H12Cl4N2, the asymmetric unit is one half-molecule. Weak van der Waals interactions between the molecules are effective in the molecular packing. This is the first reported structure of a chloro-substituted benzaldehyde derivative that can potentially form a tetradentate ligand.
  •  
2900.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 2891-2900 av 1655423
Typ av publikation
tidskriftsartikel (866460)
konferensbidrag (288698)
bokkapitel (143999)
doktorsavhandling (94502)
rapport (88034)
annan publikation (49682)
visa fler...
bok (28922)
recension (28523)
forskningsöversikt (22596)
licentiatavhandling (17978)
samlingsverk (redaktörskap) (16725)
konstnärligt arbete (7278)
proceedings (redaktörskap) (3150)
patent (1693)
visa färre...
Typ av innehåll
refereegranskat (1021193)
övrigt vetenskapligt/konstnärligt (551251)
populärvet., debatt m.m. (81574)
Författare/redaktör
Zetterberg, Henrik, ... (2093)
Blennow, Kaj, 1958 (1819)
aut (1725)
Linderson, Hans (1676)
Lundälv, Jörgen, 196 ... (1618)
Harrison, Dick (1374)
visa fler...
Zwalinski, L. (1328)
Nilsson, Peter (1308)
Larsson, Anders (1279)
Strandberg, Jonas (1231)
Liu, Y. (1192)
Ekelöf, Tord (1174)
Zhu, J. (1143)
Brenner, Richard (1128)
Ellert, Mattias (1119)
Aad, G (1056)
Abbott, B. (1016)
Lind, Lars (1003)
Bohm, Christian (993)
Winblad, B (974)
Zhang, J. (958)
He, Sailing (947)
Sundén, Bengt (939)
Meyer, J. (920)
Halldin, C (907)
Zhang, X. (898)
Zhang, Z. (884)
Johansson, Börje (884)
Ågren, Hans (884)
KLARESKOG, L (870)
Lund-Jensen, Bengt (855)
Olsson, T (855)
Sundquist, Kristina (850)
Zhang, H. (836)
Wang, J. (830)
Sörlin, Sverker (827)
Li, X. (826)
Zhou, B. (820)
Sundquist, Jan (819)
Yang, H. (816)
Wang, H. (806)
Li, J. (806)
Johansson, Tord (805)
Chen, X. (804)
Silverstein, Samuel ... (802)
Qian, J. (800)
Han, L. (799)
Evans, H. (798)
Brandt, A. (795)
Fox, H. (792)
visa färre...
Lärosäte
Uppsala universitet (272339)
Lunds universitet (220171)
Karolinska Institutet (198725)
Göteborgs universitet (164148)
Kungliga Tekniska Högskolan (131746)
Stockholms universitet (116358)
visa fler...
Linköpings universitet (106611)
Chalmers tekniska högskola (90293)
Umeå universitet (87357)
Luleå tekniska universitet (53082)
Linnéuniversitetet (43231)
Sveriges Lantbruksuniversitet (43111)
Örebro universitet (39279)
Karlstads universitet (27546)
Jönköping University (26758)
RISE (25873)
Mittuniversitetet (23125)
Malmö universitet (20478)
Södertörns högskola (19718)
Mälardalens universitet (19117)
Högskolan Dalarna (15350)
Högskolan Kristianstad (15093)
Högskolan i Gävle (12888)
Högskolan i Borås (12517)
Högskolan i Halmstad (11347)
VTI - Statens väg- och transportforskningsinstitut (10185)
Naturvårdsverket (8274)
Blekinge Tekniska Högskola (8062)
Handelshögskolan i Stockholm (8034)
Högskolan i Skövde (7397)
Riksantikvarieämbetet (7155)
Högskolan Väst (6788)
Försvarshögskolan (4329)
Gymnastik- och idrottshögskolan (3685)
Marie Cederschiöld högskola (3634)
Naturhistoriska riksmuseet (3611)
IVL Svenska Miljöinstitutet (3470)
Nordiska Afrikainstitutet (1972)
Institutet för språk och folkminnen (1765)
Röda Korsets Högskola (1338)
Konstfack (1330)
Sophiahemmet Högskola (1177)
Enskilda Högskolan Stockholm (941)
Kungl. Musikhögskolan (594)
Nationalmuseum (529)
Havs- och vattenmyndigheten (509)
Stockholms konstnärliga högskola (502)
Kungl. Konsthögskolan (271)
visa färre...
Språk
Engelska (1334133)
Svenska (275913)
Latin (12008)
Tyska (7151)
Odefinierat språk (6178)
Franska (4051)
visa fler...
Spanska (2493)
Danska (2413)
Norska (1954)
Italienska (1295)
Finska (1243)
Ryska (1135)
Polska (916)
Portugisiska (604)
Kinesiska (538)
Nederländska (413)
Japanska (352)
Arabiska (253)
Nygrekiska (213)
Turkiska (207)
Persiska (201)
Estniska (181)
Ungerska (168)
Isländska (159)
Tjeckiska (119)
Lettiska (103)
Ukrainska (99)
Grekiska, klassisk (89)
Rumänska (82)
Bulgariska (78)
Kroatiska (66)
Serbiska (53)
Esperanto (50)
Koreanska (48)
Litauiska (38)
Bosniska (30)
Hindi (29)
Annat språk (28)
Slovakiska (26)
Katalanska (26)
Vietnamesiska (25)
Slovenska (23)
Nynorsk (22)
Bokmål (15)
Kurdiska (11)
Samiska (11)
Iriska (11)
Hebreiska (10)
Albanska (10)
Indonesiska (10)
Baluchi (7)
Flera språk (5)
Swahili (5)
Mongoliskt språk (4)
Färöiska (3)
language:Fra_t (3)
Belarusiska (2)
Somaliska (2)
Bengali (2)
Makedonska (1)
Amhariska (1)
Baskiska (1)
Spanjolska (1)
Kazakiska (1)
Zulu (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Naturvetenskap (342218)
Samhällsvetenskap (327186)
Medicin och hälsovetenskap (250257)
Teknik (234235)
Humaniora (191121)
Lantbruksvetenskap (38808)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy