Journal articles on the topic 'TLS Certificates'

To see the other types of publications on this topic, follow the link: TLS Certificates.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'TLS Certificates.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.

Full text
Abstract:
This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certificate subject, as well as the port of the certificate transmission and network connection. The results of an experimental study allow the authors to state with a high degree of probability that Tor network certificates can be identified in the data stream between the client and server of the specified network by their size, which is between 400 and 600 bytes. The list of features of the Tor network certificates is intended to develop software or add-ons to existing ones, which is used to block access of Internet users to Darknet resources or to limit the use of the Tor anonymous network service. Based on data on the distinguishing features of Tor network certificates, an algorithm is proposed for blocking access to the Internet for users of the Tor Bundle.
APA, Harvard, Vancouver, ISO, and other styles
2

Foppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.

Full text
Abstract:
Abstract TLS, and SSL before it, has long supported the option for clients to authenticate to servers using their own certificates, but this capability has not been widely used. However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time. Wachs et al. [42] determined iOS client certificates could be used by passive network adversaries to track individual devices across the internet. Subsequently, Apple has patched their software to fix this vulnerability. We show these countermeasures are not effective by demonstrating three novel active attacks against TLS Client Certificate Authentication that are successful despite the defenses. Additionally, we show these attacks work against all known instances of TLS Client Certificate Authentication, including smart cards like those widely deployed by the Estonian government as part of their Digital ID program. Our attacks include in-path man-in-the-middle versions as well as a more powerful on-path attack that can be carried out without full network control.
APA, Harvard, Vancouver, ISO, and other styles
3

Lapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.

Full text
Abstract:
This paper presents the result of author’s research aimed at developing a detecting and identifying method of the Tor Bundle use in data transmission networks, in particular, on the Internet. Based on these characteristics, an algorithm has been developed that allows legitimate blocking of user access to a global network by a popular anonymizer. The subject of the study was an SSL/TLS encryption certificate, which is transmitted by the Tor network server to the user of the Tor Bundle and which contains the set of data necessary for its identification during the implementation of the TLS “handshake”. In the course of the study of the certificates features, several distinguishing features were identified, namely: the name of the subject and issuer of the certificate, which is a random set of letters and numbers; port used when connecting to an anonymous network; certificate size. Based on the data received, a method is proposed that allows the provider’s server to block the connection during which a certificate with certain characteristics is transmitted.
APA, Harvard, Vancouver, ISO, and other styles
4

Park, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Astorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications." Sensors 22, no. 7 (March 27, 2022): 2561. http://dx.doi.org/10.3390/s22072561.

Full text
Abstract:
Digital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of digital certificates relies on centralized Certification Authority (CA)-based Public Key Infrastructures (PKIs). However, the implementation of PKIs and certificate lifecycle management procedures in Industrial Internet of Things (IIoT) environments presents some challenges, mainly due to the high resource consumption that they imply and the lack of trust in the centralized CAs. This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. Most proposals rely on the introduction of a Trusted Third Party to aid the IIoT devices in tasks that exceed their capacity. The proposed alternatives are complementary and their application depends on the specific challenge to solve, the application scenario, and the capacities of the involved IIoT devices. This paper revisits all these alternatives in light of industrial communication models, identifying their strengths and weaknesses, and providing an in-depth comparative analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (Authentication Header), and ESP (Encapsulation Security Payload). For the SSL/TLS and IPsec specifications, the basic handshake protocols and the main stages of their development are considered. The described handshakes include primary cryptographic information exchange cycles in the form of identifiers of interaction participants, one-time numbers, lists of supported cryptographic combinations. Authentication of participants based on certificates, shared symmetric keys, data exchange for establishing a shared Diffie — Hellman secret, development of key material for secret keys of communication sessions, message authentication, and other cryptographic parameters are presented. For different versions of SSL/TLS and IPsec, the logical structures of application data cryptographic protection functions are described.
APA, Harvard, Vancouver, ISO, and other styles
7

Busygin, A. G., A. S. Konoplev, and M. O. Kalinin. "Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates." Automatic Control and Computer Sciences 50, no. 8 (December 2016): 743–48. http://dx.doi.org/10.3103/s0146411616080290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wazan, Ahmad Samer, Romain Laborde, David W. Chadwick, Francois Barrere, Abdelmalek Benzekri, Mustafa Kaiiali, and Adib Habbal. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.

Full text
Abstract:
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB). In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.
APA, Harvard, Vancouver, ISO, and other styles
9

Pan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.

Full text
Abstract:
Many famous attacks take web browsers as transmission channels to make the target computer infected by malwares, such as watering hole and domain name hijacking. In order to protect the data transmission, the SSL/TLS protocol has been widely used to defeat various hijacking attacks. However, the existence of such encryption protection makes the security software and devices confront with the difficulty of analyzing the encrypted malicious traffic at endpoints. In order to better solve this kind of situation, this paper proposes a new efficient and transparent method for large-scale automated TLS traffic analysis, named as hyper TLS traffic analysis (HTTA). It extracts multiple types of valuable data from the target system in the hyper mode and then correlates them to decrypt the network packets in real time, so that overall data correlation analysis can be performed on the target. Additionally, we propose an aided reverse engineering method to support the analysis, which can rapidly identify the target data in different versions of the program. The proposed method can be applied to the endpoints and cloud platforms; there are no trust risk of certificates and no influence on the target programs. Finally, the real experimental results show that the method is feasible and effective for the analysis, which leads to the lower runtime overhead compared with other methods. It covers all the popular browser programs with good adaptability and can be applied to the large-scale analysis.
APA, Harvard, Vancouver, ISO, and other styles
10

Lapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.

Full text
Abstract:
Purpose of the study: development of a method that allows detecting and identifying packets of the Tor network, including obfuscated packets on the local machine of the network user, by a Wireshark sniffer using the filter syntax based on the features of the Tor network packets characteristic of the TLS v1.2 and v1.3 encryption versions; studying the possibility of using the SSL Bump attack (decrypting https traffic on a virtual server using self-signed x.509 certificates) to overcome the obfuscation of Tor network packets. Method: software analysis of transmitted network packets, decomposition of the contents of data packets according to their size and belonging to encryption protocols, a comparative method in relation to different versions of the encryption protocol and resources, synthesis of filtering rules based on the syntax of the analyzer was used. Results: an applied method was developed that allows detecting and identifying packets of the Tor Network, including obfuscated packets on the local machine of the network user, by a Wireshark sniffer based on the filtering syntax based on the signs of encryption packets of the TLS v1.2 and v1.3 versions; data on the impossibility of using the SSL Bump attack to overcome the obfuscation of the Tor network was obtained.
APA, Harvard, Vancouver, ISO, and other styles
11

de Sanjosé Blasco, José, Manuel Gómez-Lende, Manuel Sánchez-Fernández, and Enrique Serrano-Cañadas. "Monitoring Retreat of Coastal Sandy Systems Using Geomatics Techniques: Somo Beach (Cantabrian Coast, Spain, 1875–2017)." Remote Sensing 10, no. 9 (September 19, 2018): 1500. http://dx.doi.org/10.3390/rs10091500.

Full text
Abstract:
The dynamics and evolution of a coastal sandy system over the last 142 years (1875–2017) were analyzed using geomatics techniques (historical cartography, photogrammetry, topography, and terrestrial laser scanning (TLS)). The continuous beach–dune system is a very active confining sand barrier closing an estuarine system where damage is suffered by coastal infrastructures and houses. The techniques used and documentary sources involved historical cartography, digitalizing the 5-m-level curve on the maps of 1875, 1908, 1920, 1950, and 1985; photogrammetric flights of 1985, 1988, and 2001 without calibration certificates, digitalizing only the upper part of the sandy front; photogrammetric flights of 2005, 2007, 2010, and 2014, using photogrammetric restitution of the 5-m-level curve; topo-bathymetric profiles made monthly between 1988 and 1993 using a total station; a terrestrial laser scanner (TLS) since 2011 by means of two annual measurements; and the meteorological data for the period of 1985–2017. The retreat of the sandy complex was caused by winter storms with large waves and swells higher than 6 m, coinciding with periods demonstrating a high tidal range of over 100 and periods with a large number of strong storms. The retreat was 8 m between December 2013 and March 2014. The overall change of the coastline between 1875 and 2017 was approximately 415 m of retreat at Somo Beach. The erosive processes on the foredune involved the outcrop of the rock cliff in 1999 and 2014, which became a continuous rocky cliff without sands. To know the recent coastal evolution and its consequences on the human environment, the combined geomatic techniques and future TLS data series may lead to the improvement in the knowledge of shoreline changes in the context of sea level and global changes.
APA, Harvard, Vancouver, ISO, and other styles
12

Asratian, R. E. "Secure Network Channel for Web Services based on SSL/TLS Technology in a Linux Environment." Programmnaya Ingeneria 13, no. 3 (March 23, 2022): 124–31. http://dx.doi.org/10.17587/prin.13.124-131.

Full text
Abstract:
An approach to the organization of secure interaction in distributed systems via a public network is considered, based on the organization of secure communication channels based on sSl/TLS technology. Unlike VPN technology, the described approach is strictly focused on supporting only HTTP/SOAP interactions in distributed systems, which allows you to implement authentication and authorization based on HTTP-header data and client public key certifi­cates as ready-made technical solutions. The approach implies the use of special gateways that provide switching from HTTP to HTTPS on the client side and switching from HTTPS to HTTP on the web server side and make up a "transparent" communication channel for system components. It is assumed that both client programs and web serv­ers are located in the same secure private network (or even on the same network node) with the gateways serving them, and only the interaction between the gateways is carried out through the public network. The work of gateways is based on the use of SSL/TLS technology to add a secure channel over an already open TCP connection. The main idea of the approach is that in this case, security tools are connected at high levels of the OSI protocol hierarchy, which allows gateways to analyze high-level parameters of information requests and responses of web servers con­tained in HTTP-headers. And this, in turn, allows you to add additional "intelligence" to the gateways associated with authentication of servers and clients, as well as with the differentiation of access rights to information resources up to individual functions (methods) of web services based on the data contained in "Subject Name" attribute of public key certificates. The implementation of the approach in the Linux environment and the results of an experimental study are described. In particular, the study showed that when calling service functions with a runtime of 0.5 seconds or higher, the secure channel increases the total query execution time by only a few percent, even with a rather large amount of data being transmitted (up to 200 kilobytes).
APA, Harvard, Vancouver, ISO, and other styles
13

Figueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.

Full text
Abstract:
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence companies and the general population, especially for attacks targeting critical infrastructural assets, such as power plants, water distribution and railway transportation systems. In order to provide security mechanisms to the protocol, the Modbus organization released security specifications, which provide robust protection through the blending of Transport Layer Security (TLS) with the traditional Modbus protocol. TLS will encapsulate Modbus packets to provide both authentication and message-integrity protection. The security features leverage X.509v3 digital certificates for authentication of the server and client. From the security specifications, this study addresses the security problems of the Modbus protocol, proposing a new secure version of a role-based access control model (RBAC), in order to authorize both the client on the server, as well as the Modbus frame. This model is divided into an authorization process via roles, which is inserted as an arbitrary extension in the certificate X.509v3 and the message authorization via unit id, a unique identifier used to authorize the Modbus frame. Our proposal is evaluated through two approaches: A security analysis and a performance analysis. The security analysis involves verifying the protocol's resistance to different types of attacks, as well as that certain pillars of cybersecurity, such as integrity and confidentiality, are not compromised. Finally, our performance analysis involves deploying our design over a testnet built on GNS3. This testnet has been designed based on an industrial security standard, such as IEC-62443, which divides the industrial network into levels. Then both the client and the server are deployed over this network in order to verify the feasibility of the proposal. For this purpose, different latencies measurements in industrial environments are used as a benchmark, which are matched against the latencies in our proposal for different cipher suites.
APA, Harvard, Vancouver, ISO, and other styles
14

Kang, James Jin, Kiran Fahd, and Sitalakshmi Venkatraman. "Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity." Cryptography 2, no. 4 (December 5, 2018): 38. http://dx.doi.org/10.3390/cryptography2040038.

Full text
Abstract:
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability—referred to as the CIA triad. While confidentiality and integrity can be achieved using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates, these depend on the correct authentication of servers, which could be compromised due to man-in-the-middle (MITM) attacks. Many existing solutions have practical limitations due to their operational complexity, deployment costs, as well as adversaries. We propose a novel scheme to detect MITM attacks with minimal intervention and workload to the network and systems. Our proposed model applies a novel inferencing scheme for detecting true anomalies in transmission time at a trusted time server (TTS) using time-based verification of sent and received messages. The key contribution of this paper is the ability to automatically detect MITM attacks with trusted verification of the transmission time using a learning-based inferencing algorithm. When used in conjunction with existing systems, such as intrusion detection systems (IDS), which require comprehensive configuration and network resource costs, it can provide a robust solution that addresses these practical limitations while saving costs by providing assurance.
APA, Harvard, Vancouver, ISO, and other styles
15

Khan, Salabat, Liehuang Zhu, Zijian Zhang, Mussadiq Abdul Rahim, Khalid Khan, and Meng Li. "Attack-Resilient TLS Certificate Transparency." IEEE Access 8 (2020): 98958–73. http://dx.doi.org/10.1109/access.2020.2996997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rajakumar, Jayanth. "OVERVIEW OF TLS CERTIFICATE REVOCATION MECHANISMS." International Journal of Advanced Research in Computer Science 10, no. 3 (June 20, 2019): 54–59. http://dx.doi.org/10.26483/ijarcs.v10i3.6408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ukrop, Martin, Lydia Kraus, and Vashek Matyas. "Will You Trust This TLS Certificate?" Digital Threats: Research and Practice 1, no. 4 (December 29, 2020): 1–29. http://dx.doi.org/10.1145/3419472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pradeep, Amogh, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, and David Choffnes. "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 29–46. http://dx.doi.org/10.56553/popets-2023-0003.

Full text
Abstract:
The transparency and privacy behavior of mobile browsers has remained widely unexplored by the research community. In fact, as opposed to regular Android apps, mobile browsers may present contradicting privacy behaviors. On the one end, they can have access to (and can expose) a unique combination of sensitive user data, from users’ browsing history to permission-protected personally identifiable information (PII) such as unique identifiers and geolocation. However, on the other end, they also are in a unique position to protect users’ privacy by limiting data sharing with other parties by implementing ad-blocking features. In this paper, we perform a comparative and empirical analysis on how hundreds of Android web browsers protect or expose user data during browsing sessions. To this end, we collect the largest dataset of Android browsers to date, from the Google Play Store and four Chinese app stores. Then, we developed a novel analysis pipeline that combines static and dynamic analysis methods to find a wide range of privacy-enhancing (e.g., ad-blocking) and privacy-harming behaviors (e.g., sending browsing histories to third parties, not validating TLS certificates, and exposing PII---including non-resettable identifiers---to third parties) across browsers. We find that various popular apps on both Google Play and Chinese stores have these privacy-harming behaviors, including apps that claim to be privacy-enhancing in their descriptions. Overall, our study not only provides new insights into important yet overlooked considerations for browsers’ adoption and transparency, but also that automatic app analysis systems (e.g., sandboxes) need context-specific analysis to reveal such privacy behaviors.
APA, Harvard, Vancouver, ISO, and other styles
19

Tian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (October 12, 2019): 1–37. http://dx.doi.org/10.1145/3355048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Jornet-Monteverde, Julio Antonio, and Juan José Galiana-Merino. "Low-Cost Conversion of Single-Zone HVAC Systems to Multi-Zone Control Systems Using Low-Power Wireless Sensor Networks." Sensors 20, no. 13 (June 27, 2020): 3611. http://dx.doi.org/10.3390/s20133611.

Full text
Abstract:
This paper presents a novel approach to convert a conventional house air conditioning installation into a more efficient system that individually controls the temperature of each zone of the house through Wi-Fi technology. Each zone regulates the air flow depending on the detected temperature, providing energy savings and increasing the machine performance. Therefore, the first step was to examine the communication bus of the air conditioner and obtain the different signal codes. Thus, an alternative Controller module has been designed and developed to control and manage the requests on the communication bus (Bus–Wi-Fi gateway). A specific circuit has been designed to adapt the signal of the serial port of the Controller with the communication bus. For the acquisition of the temperature and humidity data in each zone, a Node module has been developed, which communicates with the Controller through the Wi-Fi interface using the Message Queuing Telemetry Transport (MQTT) protocol with Secure Sockets Layer / Transport Layer Security (SSL/TLS) certificates. It has been equipped with an LCD touch screen as a human-machine interface. The Controller and the Node modules have been developed with the ultra-low power consumption CC3200 microController of Texas Instruments and the code has been implemented under the TI-RTOS real-time operating system. An additional module based on the Raspberry Pi computer has been designed to create the Wi-Fi network and implement the required network functionalities. The developed system not only ensures that the temperature in each zone is the desired one, but also controls the fan velocity of the indoor unit and the opening area of the vent registers, which considerably improves the efficiency of the system. Compared with the single-zone system, the experiments carried out show energy savings between 75% and 94% when only one of the zones is selected, and 44% when the whole house is air-conditioned, in addition to considerably improving user comfort.
APA, Harvard, Vancouver, ISO, and other styles
21

Khan, Salabat, Zijian Zhang, Liehuang Zhu, Meng Li, Qamas Gul Khan Safi, and Xiaobing Chen. "Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties." Security and Communication Networks 2018 (July 18, 2018): 1–16. http://dx.doi.org/10.1155/2018/8527010.

Full text
Abstract:
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system; it consists of processes, policies, and entities that are responsible for a secure certificate management process. Among them, Certificate Authority (CA) is the central and most trusted entity. However, recent compromises of CA result in the desire for some other secure and transparent alternative approaches. To distribute the trust and mitigate the threats and security issues of current PKI, publicly verifiable log-based approaches have been proposed. However, still, these schemes have vulnerabilities and inefficiency problems due to lack of specifying proper monitoring, data structure, and extra latency. We propose Accountable and Transparent TLS Certificate Management: an alternate Public-Key Infrastructure (PKI) with verifiable trusted parties (ATCM) that makes certificate management phases; certificate issuance, registration, revocation, and validation publicly verifiable. It also guarantees strong security by preventing man-in-middle-attack (MitM) when at least one entity is trusted out of all entities taking part in the protocol signing and verification. Accountable and Transparent TLS Certificate Management: an alternate Public-Key Infrastructure (PKI) with verifiable trusted parties (ATCM) can handle CA hierarchy and introduces an improved revocation system and revocation policy. We have compared our performance results with state-of-the-art log-based protocols. The performance results and evaluations show that it is feasible for practical use. Moreover, we have performed formal verification of our proposed protocol to verify its core security properties using Tamarin Prover.
APA, Harvard, Vancouver, ISO, and other styles
22

Amirkhani, Shiva, Ali Bahadori-Jahromi, Anastasia Mylona, Paulina Godfrey, Darren Cook, Hooman Tahayori, and Hexin Zhang. "Uncertainties in Non-Domestic Energy Performance Certificate Generating in the UK." Sustainability 13, no. 14 (July 7, 2021): 7607. http://dx.doi.org/10.3390/su13147607.

Full text
Abstract:
In light of the recent launch of the Minimum Energy Efficiency Standard targeting the energy performance of commercial buildings, this study compares the energy performance certificates of three UK hotels generated by two different software, EDSL TAS and SBEM, both accredited by the UK government for the purpose. Upon finding the results discrepant, the study finds that the two software’s different assumptions for the air permeability rate contribute to the discrepancy. While modifying this value makes the results from the two software more aligned, further issues regarding the validation process arise. The study continues to find that the underlying issue can be found within the National Calculation Methodology’s assumption about domestic hot water consumption in hotels. These assumptions are compulsory to follow when generating a non-domestic energy performance certificate in the UK, therefore, any uncertainties within them can affect all the buildings seeking an energy performance certificate within that sector. Finally, the study discusses that, for meeting the carbon dioxide mitigation goals, it is necessary to make changes to the current procedure of energy performance certificate generating in the UK to increase its reliability.
APA, Harvard, Vancouver, ISO, and other styles
23

Diaz-Sanchez, Daniel, Andres Marin-Lopez, Florina Almenarez Mendoza, Patricia Arias Cabarcos, and R. Simon Sherratt. "TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications." IEEE Communications Surveys & Tutorials 21, no. 4 (2019): 3502–31. http://dx.doi.org/10.1109/comst.2019.2914453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Gomez, Gibran, Platon Kotzias, Matteo Dell’Amico, Leyla Bilge, and Juan Caballero. "Unsupervised Detection and Clustering of Malicious TLS Flows." Security and Communication Networks 2023 (January 12, 2023): 1–17. http://dx.doi.org/10.1155/2023/3676692.

Full text
Abstract:
Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious TLS flows is important, but it is a challenging problem. Prior works have proposed supervised machine learning detectors using TLS features. However, by trying to represent all malicious traffic, supervised binary detectors produce models that are too loose, thus introducing errors. Furthermore, they do not distinguish flows generated by different malware. On the other hand, supervised multiclass detectors produce tighter models and can classify flows by the malware family but require family labels, which are not available for many samples. To address these limitations, this work proposes a novel unsupervised approach to detect and cluster malicious TLS flows. Our approach takes input network traces from sandboxes. It clusters similar TLS flows using 90 features that capture properties of the TLS client, TLS server, certificate, and encrypted payload and uses the clusters to build an unsupervised detector that can assign a malicious flow to the cluster it belongs to, or determine if it is benign. We evaluate our approach using 972K traces from a commercial sandbox and 35M TLS flows from a research network. Our clustering shows very high precision and recall with an F1 score of 0.993. We compare our unsupervised detector with two state-of-the-art approaches, showing that it outperforms both. The false detection rate of our detector is 0.032% measured over four months of traffic.
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Yingjie, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, and Wei Wang. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Budi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (March 18, 2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.

Full text
Abstract:
Extensible Authentication Protocol (EAP) is authentication method to protect wireless local area network from un-authorized user which there was interaction between radius servers, access point and client device. When EAP was used as authentication method, the authentication can be strengthened by using TLS (Transport Layer Security) certificate where client device and server will use certificate to verify the identity of each other. The certificate must meet requirement on the server and client for the successful authentication. For this time, the authentication method provides highest level for security in wireless local area network because this method can protect man-in-middle vulnerability.The proposed framework is evaluated by using scenario in testing and live environment to ensure that the authentication has been securely for mutual device authentication.
APA, Harvard, Vancouver, ISO, and other styles
27

Fuentes, R., A. Lanero, and J. Luis Vázquez. "ARE OFFICIAL CERTIFICATIONS A RELEVANT ASPECT IN THE CONSUMPTION OF NATURAL WINES? A PROSPECTIVE STUDY AMONG SPANISH PRODUCERS/CONSUMERS." Trakia Journal of Sciences 19, Suppl.1 (2021): 393–98. http://dx.doi.org/10.15547/tjs.2021.s.01.057.

Full text
Abstract:
PURPOSE: Spain is leader in the world ranking of surface vineyards of ecological production, with almost 27% of world production. Consumers are demanding for more information about these sustainable practices and the official certificates can be a good option to help them. In the case of natural wines, four certifications can be used in the packaging of wines to inform consumers that they are acquiring natural wine: i) certified organic winery by the EU; ii) certified biodynamic winery by Demeter; iii) certified organic (EU) and biodynamic (Demeter) winery; iv) certified by the National Institute of Origins and Quality (INAO) as ‘vin méthode nature’ (natural method wine) with two logos (natural method without added sulphites and natural method with less than 30 mg/l added sulphites). To obtain the results we have conducted a pilot study with a sample of 358 Spanish consumers of wine divided by experts and non-experts. RESULTS: The results have confirmed there is a tendency in food-related on labelling in recent years to be focused on sustainability labelling and certification. CONCLUSIONS AND IMPLICATIONS: The research has given us an idea about the importance of sustainability for consumers of natural wine and if an official certificate is a necessary question for them in the decision-making process. Thus, labelling certifications may increase the information for the consumers and could also be an opportunity to generate an increased level of credibility in natural wines, "the great unknown".
APA, Harvard, Vancouver, ISO, and other styles
28

Kohlar, Florian, Jörg Schwenk, Meiko Jensen, and Sebastian Gajek. "On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security." International Journal of Mobile Computing and Multimedia Communications 3, no. 4 (October 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011100102.

Full text
Abstract:
In recent research, two approaches to protect SAML based Federated Identity Management (FIM) against man-in-the-middle attacks have been proposed. One approach is to bind the SAML assertion and the SAML artifact to the public key contained in a TLS client certificate. Another approach is to strengthen the Same Origin Policy of the browser by taking into account the security guarantees TLS gives. This work presents a third approach which is of further interest beyond IDM protocols, especially for mobile devices relying heavily on the security offered by web technologies. By binding the SAML assertion to cryptographically derived values of the TLS session that has been agreed upon between client and the service provider, this approach provides anonymity of the (mobile) browser while allowing Relying Party and Identity Provider to detect the presence of a man-in-the-middle attack.
APA, Harvard, Vancouver, ISO, and other styles
29

Yamakawa, Daiki, Takashi Okimoto, Songpon Teerakanok, Atsuo Inomata, and Tetsutaro Uehara. "Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA." Security and Communication Networks 2021 (February 16, 2021): 1–14. http://dx.doi.org/10.1155/2021/6610863.

Full text
Abstract:
Today, smart devices and services have become a part of our daily life. These devices and services offer a richer user experience with a much higher quality of services than before. Many of them utilize sensing functions via cloud architecture to perform remote device controls and monitoring. Generally, the security of the communication between these devices and the service provider (e.g., cloud server) is achieved by using the TLS protocol via PKI standard. In this study, we investigate the risk associating with the use of public certificate authorities (CAs) in a PKI-based IoT system. An experiment is conducted to demonstrate existing vulnerabilities in real IoT devices available in the market. Next, the use of a private CA in the cloud-centric IoT architecture is proposed to achieve better control over the certificate issuing process and the validity period of the certificate. Lastly, the security analysis pointing out the strengths and drawbacks of the proposed method is discussed in detail.
APA, Harvard, Vancouver, ISO, and other styles
30

Cueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (February 24, 2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.

Full text
Abstract:
La seguridad en la capa de aplicación (SSL), proporciona la confidencialidad, integridad y autenticidad de los datos, entre dos aplicaciones que se comunican entre sí. El presente artículo es el resultado de haber implementado certificados SSL / TLS gratuitos en servidores de aplicación, determinando las características relevantes que debe tener un certificado SSL/TLS, la Autoridad certificadora que lo emita. Se realiza un análisis de las vulnerabilidades en los servidores web y se establece un canal cifrado de comunicaciones con el fin de proteger de ataques como hombre en el medio, phising y mantener la integridad de la información que es trasmitida entre el cliente y servidor.
APA, Harvard, Vancouver, ISO, and other styles
31

Sebastiany, D. B., L. Ignaczak, and M. D. V. Freitas. "Uma Análise dos Certificados Digitais Utilizados nas Conexões TLS dos Aplicativos de Mobile Banking na Plataforma Android." Revista de Empreendedorismo, Inovação e Tecnologia 2, no. 1 (June 30, 2015): 66–75. http://dx.doi.org/10.18256/2359-3539/reit-imed.v2n1p66-75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ulum, Muh Bachrul. "Kedudukan Hasil Tes DNA dalam Penetapan Status Hukum Anak Luar Nikah." Al-Manahij: Jurnal Kajian Hukum Islam 3, no. 1 (June 15, 2009): 69–82. http://dx.doi.org/10.24090/mnh.v3i1.3681.

Full text
Abstract:
Marriage law states that the descent of somebody can only be approved by birth certificate or decision from a Religious Court, based on sufficient evidences. DNA as one evidence is a blue print which explains the blood relation that can be descended to the next generation. However, the validity of this test is still hesitated. It is because the test is still insufficient as a powerful proof which can be used in courts.
APA, Harvard, Vancouver, ISO, and other styles
33

Cisel, Matthieu. "Certificats de MOOC : débats passés et présents sur un objet en évolution rapide." Médiations et médiatisations 1, no. 1 (October 10, 2018): 97–101. http://dx.doi.org/10.52358/mm.v1i1.60.

Full text
Abstract:
Au début des années 2010, les MOOC acquièrent une notoriété, et leurs certificats, gratuits dans un premier temps, déferlent par centaines de milliers sur la Toile. D’aucuns crient à la mort des diplômes tels que nous les connaissons, et comparent le succès des différentes formations sur la base du nombre de certificats délivrés. Les débats sur ces questions prennent en ampleur, oblitérant souvent le fait que ces certificats recouvrent des réalités variées. Là où certains valident effectivement des acquis, beaucoup sont l’équivalent numérique de feuilles de présence. Après avoir montré et interprété cet état de fait sur la base de propos récoltés au cours d’une enquête menée auprès de concepteurs de MOOC, nous revenons sur les débats engendrés par les évolutions récentes de ces certificats. La gratuité a presque disparu, le secteur privé a commencé à se faire sa place dans l’univers MOOC, ce qui ne manque pas de questionner le devenir des certificats nouvelle génération dans le milieu académique.
APA, Harvard, Vancouver, ISO, and other styles
34

Rosado, David Garcia, Luis Enrique Sanchez, Daniel Mellado, and Eduardo Fernandez Medina. "Content related to Computing Security on Computer Engineering Degree according to International Professional Certificates." IEEE Latin America Transactions 13, no. 6 (June 2015): 1951–60. http://dx.doi.org/10.1109/tla.2015.7164222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

MacCann, Robert. "Sex Differences at the NSW Higher School Certificate after Adjustment for the Effects of Differential Selection." Australian Journal of Education 39, no. 2 (August 1995): 163–88. http://dx.doi.org/10.1177/000494419503900205.

Full text
Abstract:
Sex differences in Higher School Certificate achievement were analysed by adjusting for differential selection. A general ability criterion, favouring neither sex, was developed by modifying the Tertiary Entrance Score (TES). For each course, sex differences in achievement were displayed over eight Key Learning Areas (KLAs). Contrary to many studies based on a more restricted set of courses, it was found that females outperformed males overall. In five KLAs, females outscored males; in two, the results were mixed; and in one (Mathematics) males outscored females. Although the female TES median was 15 marks higher, males performed slightly better at high TES levels. The explanation given was that males tend to specialise in more highly intercorrelated courses than females, which creates variance in their aggregate.
APA, Harvard, Vancouver, ISO, and other styles
36

Amirkhani, Shiva, Ali Bahadori-Jahromi, Anastasia Mylona, Paulina Godfrey, and Darren Cook. "Impact of Adding Comfort Cooling Systems on the Energy Consumption and EPC Rating of an Existing UK Hotel." Sustainability 12, no. 7 (April 7, 2020): 2950. http://dx.doi.org/10.3390/su12072950.

Full text
Abstract:
In light of the recent launch of the Minimum Energy Efficiency Standard and its expected impact on the commercial buildings sector, this study investigated the impact of adding cooling systems on the annual energy consumption, carbon dioxide emissions and energy performance certificate (EPC) rating of an existing UK hotel. Thermal Analysis Software (TAS) was used to conduct the study, and the baseline model was validated against the actual data. As is the current accepted procedure in EPC generating in the UK, the cooling set points of the guest rooms were set to 25 °C, resulting in a small increase in the annual energy consumption and emission rates, but not enough to change the energy performance certificate rating. Also, it was found that an improvement in energy consumption and energy performance certificate rating of the hotel would be achieved if the new systems replaced the existing heating systems in the guest rooms. Further simulations investigated more realistic situations, in which occupants may decide to keep their rooms at cooler temperatures. The results from this round of simulations showed considerable increase in the energy consumption and emissions of the building; however, these results would not be considered in the current approved procedure for EPC generating.
APA, Harvard, Vancouver, ISO, and other styles
37

Kanakam, Dr Sivarama Prasad. "ECDSA: The Virtual Signature Set of Rules of a Higher Internet." International Journal of Engineering and Computer Science 10, no. 10 (October 31, 2021): 25408–12. http://dx.doi.org/10.18535/ijecs/v10i10.4630.

Full text
Abstract:
Computerized Currency is an electronic kind of cash. These days, everything is developing into digitization measure. This contains all properties like actual cash and furthermore permits prompt trades which will be reliably executed across the world while partner with upheld contraptions and organizations. In this paper we presented the SHA3-512 bit hashing algorithm and ECDSA algorithm for generation of digital signature. The Elliptic curve cryptography (ECC) is one of the greater promising technology on this area. ECC-enabled TLS is quicker and greater scalable on our servers and presents the equal or higher protection than the default cryptography in use at the web. one of the elliptic curve algorithm, the elliptic curve virtual signature algorithm (ECDSA), may be used to enhance overall performance at the Internet. CloudFlare now helps custom ECDSA certificate for our clients and that’s true for all people the use of the Internet.
APA, Harvard, Vancouver, ISO, and other styles
38

Montiel Paternina, Silvio. "Impacto del tlc con estados unidos sobre los sectores económicos colombianos." Saber, Ciencia y Libertad 8, no. 1 (January 1, 2013): 125–30. http://dx.doi.org/10.18041/2382-3240/saber.2013v8n1.1885.

Full text
Abstract:
En este artículo se hace un análisis de la incidencia del Tratado de Libre Comercio con Estados Unidos (TLC) sobre los principales sectores económicos colombianos. Se estudiaron la ganadería, la agricultura y la avicultura. Para los ganaderos el balance es negativo debido a que no han podido exporta ni carne ni leche porque no cumplen los requisitos sanitarios exigidos por Estados Unidos para permitir el acceso de los productos cárnicos y lácteos. El ICA y el Invima son las entidades estatales encargadas de conseguir los certificados sanitarios. En cambio, para el sector agrícola los resultados han sido mejores, ya que se han incrementado las importaciones de flores, café y banano, además de ampliar la oferta de otros productos. Para los cultivadores de cereales las cosas no han dado en los mismos términos, debido a los altos costos de producción de estos productos. Los peores resultados se han presentado en el sector avícola, donde, como comenta el presidente de Fenavi, Colombia no ha exportado a Estados Unidos “ni una pluma”, debido a que los costos de producción en Norteamérica están muy por debajo de los nuestros.
APA, Harvard, Vancouver, ISO, and other styles
39

Woodside, Rachel, Gary Rosenthal, and Claudia Olivier. "90232 Implementing the innovative academic Learning Health System Scholars (aLHSS) Postdoctoral Training Program (TL1) at Wake Forest University Health Sciences (WFUHS)." Journal of Clinical and Translational Science 5, s1 (March 2021): 132–33. http://dx.doi.org/10.1017/cts.2021.739.

Full text
Abstract:
ABSTRACT IMPACT: Learning Health System (LHS) Science that trains postdoctoral scholars from diverse professional backgrounds in methodological and professional skills to implement rigorous research in health care systems and populations, and to disseminate the findings of such research to improve healthcare delivery OBJECTIVES/GOALS: The WFUHS CTSA developed an innovative TL1 in Learning Health System (LHS) Science that trains postdoctoral scholars from diverse professional backgrounds in methodological and professional skills to implement rigorous research in health care systems and populations, and to disseminate the findings of such research to improve healthcare delivery METHODS/STUDY POPULATION: Training is centered around formal LHS science coursework and mentored research projects that address a pressing health system issue. Projects are closely guided by a primary mentor and a multidisciplinary mentoring team. Program mission and competencies were carefully evaluated in a competency-course matrix to design new courses for the LHS Certificate and MS program in Translational and Health System Science (THSS). Course domains include biomedical informatics; improvement and implementation science; system science and organizational change management; stakeholder engagement, leadership, and research management; ethics of health systems research; and health systems research methods. Scholars set up Individual Development Plans (IDP) and self-assess 7 domains of LHS core competencies. RESULTS/ANTICIPATED RESULTS: The first professionally diverse group of scholars (MD, PhD, DrPH, PharmD) began the program in Summer 2020; onboarding was conducted virtually. Scholars currently conduct most of their research and training in a virtual, synchronous format. Each developed a detailed IDP and LHS research project, which was reviewed by their LHS mentoring teams (includes a primary mentor, co-mentor, TL1 core faculty mentor, peer mentor, and health system mentor). Coursework, leading to a 1-year certificate or 2-year MS degree, was selected based on individual background and career goals and was begun in August 2020. In addition to the courses noted above, Scholars are embedded in a healthcare improvement team. We use the process of a LHS and hold weekly TL1 leadership meetings to swiftly address challenges and implement improvements DISCUSSION/SIGNIFICANCE OF FINDINGS: We envision that TL1 Scholars will build independent LHS research programs or lead health system innovation. Program evaluation includes assessments of Scholar fluency in LHS competencies and attainment of key milestones during and after training. Annual TL1 faculty retreats will address program fidelity and implementation of program refinements
APA, Harvard, Vancouver, ISO, and other styles
40

Erfani, Shiva Seyed, and Hoda Mardan. "The Relationship between Big-Five Personality Traits, English Language Proficiency Scores on IELTS, and Academic Success of Iranian Foreign Students." Theory and Practice in Language Studies 7, no. 11 (November 1, 2017): 1046. http://dx.doi.org/10.17507/tpls.0711.13.

Full text
Abstract:
There is a potential to supply personality as a psychological factor in terms of the Big-Five Model including Extraversion, Agreeableness, Consciousness, Openness to Experience, and Neuroticism. This study was an attempt to examine the relationship between Big-Five personality traits, English language proficiency scores on IELTS, and academic success of Iranian foreign students. The participants of the study included 202 Iranian students (126 males and 76 females) who studied at English speaking universities in different countries including Armenia, Austria, Australia, Canada, Cyprus, Germany, Hungary, India, Italy, Malaysia, New Zealand, Pakistan, Philippines, Sweden, the United Arab Emirates, the United Kingdom, Ukraine, and the United States of America. The necessary data for this study were collected from participants' first-semester academic reports to measure the degree of academic achievement, academic IELTS certificates to determine the language proficiency of candidates, as well as International Personality Item Pool Big-Five inventory to identify the participants’ personality traits. The data were gathered via different communication tools. The correlational analyses showed that there were significant relationships amongst personality traits and Iranian foreign students’ language proficiency. Neuroticism was the only psychological trait, negatively correlated with both language proficiency and academic success of Iranian foreign students. The study also revealed that there was a high correlation between the scores on IELTS and academic success of Iranian foreign students. Finally, multiple regression analysis indicated the causality among the Big-Five personality traits, English language proficiency score on IELTS, and academic success of Iranian foreign students. These bear testimony to the idea of cognitive approach in that one’s underlying mental processes are in charge of second language learning process.
APA, Harvard, Vancouver, ISO, and other styles
41

Kuo, Shiue-mei. "Assessing Tertiary-level ESP Enhancement Criteria for Ameliorating Occupational Mobility: Commerce and Industry Perceptions." Theory and Practice in Language Studies 6, no. 6 (June 7, 2016): 1157. http://dx.doi.org/10.17507/tpls.0606.04.

Full text
Abstract:
English for Specific Purposes (ESP) is designed to be learned and practiced as an essential component for employment preparation or occupational mobility. Learners aspire to utilize their ESP skills to enhance their occupational achievement and mobility. The objective of this study is to determine how to effectively enhance ESP learning to meet occupational needs with limited resources and time constraints. This study was conducted using an analytic hierarchy process to prioritize all factors of ESP enhancement plans among participants who often engage in staff acquisition, performance appraisal, and career development planning in the global business community. While aiming to enhance learners’ ESP level to improve their competitiveness in the workforce, this study considers four main criteria. Each criterion has sub-criteria/alternatives; these amount to 19 in total. The results show that among the four criteria, the main concerns of participants are the employees’ ESP proficiency certificate accreditation; and among the 19 sub-criteria/alternatives, the Test of English for International Communication (TOEIC) ranked the highest for achieving occupational mobility. All these factors can facilitate the determination and prioritization of the targets for ESP enhancement as well as for acquainting ESP practitioners with employers’ requirements and effectively meeting them by altering the lesson plans accordingly. Moreover, learners can strengthen their employment potential by using the ESP qualification to achieve a smoother career path.
APA, Harvard, Vancouver, ISO, and other styles
42

Jirovetz, Leopold, Gerhard Buchbauer, Albena Stoyanova, and Anastasia Balinova. "Analysis, Chemotype and Quality Control of the Essential Oil of a New Cultivated Basil (Ocimum basilicum L.) Plant from Bulgaria." Scientia Pharmaceutica 69, no. 1 (March 30, 2001): 85–89. http://dx.doi.org/10.3797/scipharm.aut-01-10.

Full text
Abstract:
The essential oil of the spice plant Ocimum basilicum L. (Lamiaceae) from Bulgaria was investigated using gas chromatographic-spectroscopic (GC/FID and GC/MS: polar, non-polar and chiral phases of GC columns) and olfactoric methods. As main compounds of this basil oil sample (R)-(-)-linalool (71.4%), (Z,E)-α-farnesene (6.5%), 1,8-cineole (5.6%), τ-cadinol (2.8%), germacrene D (1.7%), citronellol (1.2%) and bornyl acetate (1.1%) were identified. Ths results show, that the essential basil oil from Bulgaria belongs to the European linalool chemotype. The correlations of olfactoric data (qualitative and quantitative) with the presented analytical ones certificate the good quality of this Bulgarian Ocimum basilicum sample. A possible use of this essential basil oil in medicine, perfumery and foods is discussed.
APA, Harvard, Vancouver, ISO, and other styles
43

Cho, Geumhwan, Junsung Cho, Sangwon Hyun, and Hyoungshick Kim. "SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles." Applied Sciences 10, no. 9 (April 30, 2020): 3149. http://dx.doi.org/10.3390/app10093149.

Full text
Abstract:
Extensive use of unmanned aerial vehicles (commonly referred to as a “drone”) has posed security and safety challenges. To mitigate security threats caused by flights of unauthorized drones, we present a framework called SENTINEL (Secure and Efficient autheNTIcation for uNmanned aErial vehicLes) under the Internet of Drones (IoD) infrastructure. SENTINEL is specifically designed to minimize the computational and traffic overheads caused by certificate exchanges and asymmetric cryptography computations that are typically required for authentication protocols. SENTINEL initially generates a flight session key for a drone having a flight plan and registers the flight session key and its flight plan into a centralized database that can be accessed by ground stations. The registered flight session key is then used as the message authentication code key to authenticate the drone by any ground station while the drone is flying. To demonstrate the feasibility of the proposed scheme, we implemented a prototype of SENTINEL with ECDSA, PBKDF2 and HMAC-SHA256. The experiment results demonstrated that the average execution time of the authentication protocol in SENTINEL was about 3.1 times faster than the “TLS for IoT” protocol. We also formally proved the security of SENTINEL using ProVerif that is an automatic cryptographic protocol verifier.
APA, Harvard, Vancouver, ISO, and other styles
44

Jailani, Jailani, Aras Mulyadi, and Rahmat Karnila. "Studi karakteristik sub kronis limbah bahan berbahaya dan beracun fly ash industri pulp dan kertas PT. Riau Andalan Pulp and Paper." Jurnal Zona 2, no. 1 (April 30, 2018): 1–11. http://dx.doi.org/10.52364/jz.v2i1.13.

Full text
Abstract:
Sub chronic Characteristics Study of Hazardous waste fly ash Pulp and Paper Industry PT Riau Andalan Pulp and Paper aimed to observed hazardous waste characteristics, both physical or toxically characteristics (TCLP, LD50, and Sub chronic), to observe the influence of fly ash doses to mice trough toxic sub chronic characteristics tes . The research methods used survey and experimental method. Survey method is used to analyze certificate of analysis data from fly ash characteristic tesed .Experimental method is used for sub chronic tes to mice animals tes in 90 days with dosage, control (0 mg/kg body weight ), low (5 mg/kg body weight), medium (50 mg/kg body weigh), and high (500 mg/kg body weight). Results of this research showed that fly ash from Pulp and Paper Industry PT RAPP passed characteristics tes of explosive, flammable, reactive and toxic characteristics (TCLP, LD50, and Sub chronic). Dosage of fly ash level in 0 mg/kg body weight, 5 mg/kg body weight, 50 mg/kg body weight, 500 mg/kg body weight for 90 days are not influences for increasing the weight of mice body, food and beverage intake, metabolism of carbohydrates, proteins and fats, hematology and NOAEL value is over 500 mg/kg weight of body. Based on this research had been concluded that fly ash from Pulp and Paper Industry PT RAPP not identified as hazardous waste and can be submitted to KLHK for do exceptions study as hazardous waste in accordance with article 191 PP 101 Year 2014.
APA, Harvard, Vancouver, ISO, and other styles
45

BHANU, CHANDRA, N. RAVISANKAR, P. C. GHASAL, JAIRAM CHOUDHARY, RAGHUVEER SINGH, K. J. RAGHVENDRA, A. L. MEENA, et al. "Knowledge based assessment of trained certified farm advisors (CFA) on organic farming." Indian Journal of Agricultural Sciences 92, no. 1 (January 31, 2022): 85–89. http://dx.doi.org/10.56093/ijas.v92i1.120845.

Full text
Abstract:
An inter-organizational certificate course i.e. Certified Farm Advisor (CFA) in Organic Farming was jointly organized by National Institute of Agricultural Extension Management (MANAGE), Hyderabad and ICAR-Indian Institute of Farming Systems Research, Modipuram, Meerut during 2019. The objective of this certificate course was to create a cadre of “Certified Farm Advisors” in appropriate technologies of organic farming and enable them to deliver effective “Technical Advisory Services” and thereby solving the field level problems faced by the organic farmers/entrepreneurs/startups or other related stakeholders. A 15 days CFA module II was organized at ICAR- Indian Institute of Farming Systems Research, Modipuram, Meerut in two batches with 50 trainees from 15 different states and union territories. In the present study, the learning, knowledge and skill levels of the participants were analyzed. Multiple regression analysis showed that, gender, service experience and serving region significantly affected the learning ability of trainees. There was significant improvement in the knowledge and skill of trainees in various aspects of organic farming, viz. organic standards, certification and marketing network (study area A); technology package (study area B) and general knowledge (study area C). Based on the training effectiveness scores (TES), maximum improvement was observed with general knowledge of organic farming with 103.73% improvement. However, study area A and B exhibited 45.41% and 34.88% improvement, respectively. Further, the success of this inter-organizational training programme could serve as a model for streamlining HRD programmes on organic farming in the country.
APA, Harvard, Vancouver, ISO, and other styles
46

Jeon, Seungho, Chobyeol Shin, Eunnarae Ko, and Jongsub Moon. "A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting." Applied Sciences 11, no. 19 (September 29, 2021): 9072. http://dx.doi.org/10.3390/app11199072.

Full text
Abstract:
Hospitals have their own database structures and maintain their data in a closed manner. For this reason, it is difficult for researchers outside of institutions to access multi-center data. Therefore, if the data maintained by all hospitals follow a commonly shared format, researchers can analyze multi-center data using the same method. To safely analyze data using a common data model (CDM) in a distributed multi-center network environment, the objective of this study is to propose and implement the processes for distribution, executing the analysis codes, and returning the results. A secure CDM-based data analysis platform (SCAP) consists of a certificate authority (CA), authentication server (AS), code signer (CS), ticket-granting server (TGS), relaying server (RS), and service server (SS). The AS, CS, TGS, and RS form the central server group of the platform. An SS is stored on a hospital server as an agent for communication with the server group. We designed the functionalities and communication protocols among servers. To safely conduct the intended functions, the proposed protocol was implemented based on a cryptographic algorithm. An SCAP was developed as a web application running on this protocol. Users accessed the platform through a web-based interface.
APA, Harvard, Vancouver, ISO, and other styles
47

Yani, Ivo. "PENYELENGGARAAN PEMBELAJARAN VOKASI BERDASARKAN MINAT PESERTA DIDIK PADA MATA PELAJARAN KETERAMPILAN FUNGSIONAL PAKET C." JIV-Jurnal Ilmiah Visi 13, no. 2 (December 4, 2018): 145–55. http://dx.doi.org/10.21009/jiv.1302.8.

Full text
Abstract:
The package C equality education has the distinctiveness of entrepreneurship skills that are put in the functional skills subjects. During this time, the selection of the vocational types (skills) is determined by the package C manager and without the certificate of competence even though the vocational types can be determined based on the student’s interests through the Rothwell Miller Interest Blank (RMIB) test. After completing the competency tests, the graduate students can obtain the competency certificates from the Competence Certification Institutiton (LSK). This study aims to investigate (1) the students’ interest in vocational learning and (2) vocational learning outcomes in package C’s functional skills subjects. The research was conducted to the 26 research subjects of the 6th level of 2nd advanced competency degree in four PKBM at North Sumatra from August to October 2017. In order to seek out the field validation, the quasi experimental design method with pretest and post-test was used. The data collection instrumentswere in the form of tests with 15 items of multiple choice questions. The program significance was tested with the correlated t-test. The finding showed that the value of the t > ttable was (7.01> 2.06). Therefore, it could be concluded that there was a significant difference in values obtained by the students from before and after participating in sewing learning at a 5% significance level. Thus, in determining the vocational interest, the students should pay attention to the availability of the competency test places. References Badan Pengembangan Sumber Daya Manusia Pendidikan dan Kebudayaan dan Penjaminan Mutu Pendidikan.(2013). Pedoman peminatan peserta didik. Diakses melalui http://bk.fip.uny.ac.id/sites/ psikologi-pendidikanbimbingan.fip.uny.ac.id/files/PEDOMAN%20PEMINATAN%20SMA-SMK.pdf Departemen Pendidikan Nasional. (2003). Undang-Undang Republik Indonesia no. 20 tentang sistem pendidikan nasional. Jakarta. Departemen Pendidikan Nasional. (2005). Peraturan pemerintah no. 19 tentang standar nasional pendidikan. Jakarta. Direktorat Pembinaan Kursus dan Pelatihan. (2015). Kurikulum kursus dan pelatihan tata busana jenjang 2 dan 3 berbasis kerangka kualifikasi nasional Indonesia. Jakarta. Djamarah, S. B. (2008). Psikologi belajar. Jakarta: PT. Rineka Cipta. Heri, P. (1998). Pengantar perilaku manusia. Jakarta: EGC. Peraturan Menteri Pendidikan Nasional Nomor 14 Tahun 2007 tentang Standar Isi untuk Program Paket A, Program Paket B, dan Program Paket C. Peraturan Menteri Pendidikan Nasional Nomor 70 Tahun 2008 tentang Uji Kompetensi Bagi Peserta Didik Kursus dan Pelatihan dari Satuan Pendidikan Nonformal atau Warga Masyarakat yang Belajar Mandiri. Pusat Data dan Statistik Pendidikan dan Kebudayaan. (2016). Ikhtisar data pendidikan 2015/2016. Jakarta: Kemendikbud. Rothwell. (1947). Tes RMIB. Diakses melalui http://file.upi.edu/Direktori/FIP/JUR._PSIKOLOGI/195010101980022-SITI_WURYAN_INDRAWATI/TES_RMIB.pdf. Slameto. (2003). Belajar dan faktor-faktor yang mempengaruhinya. Jakarta: PT. Rineka Cipta.
APA, Harvard, Vancouver, ISO, and other styles
48

Erlan, Ahmad, Sitti Chadijah, and Yusran Udin. "Persepsi Stakeholder Tentang Program Eliminasi Filariasis di Kabupaten Enrekang, Provinsi Sulawesi Selatan : Suatu Tinjauan Studi Kasus." Jurnal Vektor Penyakit 13, no. 2 (November 25, 2019): 133–40. http://dx.doi.org/10.22435/vektorp.v13i2.1097.

Full text
Abstract:
Abstract Enrekang District was declared passed the Transmission Assessment Survey (TAS) - 3 in 2016 and received a certificate of free elephant foot area by the Ministry of Health in 2017. The study aims to thoroughly identify various aspects related to the success of Enrekang District in implementing TAS third stage to lead to the elimination of filariasis. Qualitative studies are carried out by conducting in-depth interviews with relevant stakeholders in supporting the filariasis elimination program. The research has been carried out in two locations which are sentinel areas namely Potokullin Village, Buntu Batu District, and Parombean Village, Curio District, Enrekang Regency. The results of the study show that there are important concerns from relevant stakeholder both from the health sector and across sectors towards the implementation of filariasis elimination in Enrekang District. Most stakeholders' perceptions already know what filariasis is, what the dangers are and how to prevent them. But it needs more intensive advocacy from health promotion personnel to get support from stakeholder involved in the success of the filariasis elimination program in Enrekang District. Abstrak Kabupaten Enrekang telah dinyatakan lulus Transmission Assesment Survey (TAS)-3 pada tahun 2016, bahkan telah menerima sertifikat daerah bebas kaki gajah oleh Kementerian Kesehatan pada tahun 2017. Studi ini bertujuan untuk mengetahui secara menyeluruh berbagai aspek yang terkait dengan keberhasilan Kabupaten Enrekang dalam melaksanakan TAS tahap ketiga dalam rangka menuju eliminasi filariasis. Studi kualitatif dilakukan dengan melakukan wawancara mendalam (indepth interview) kepada stakeholder yang berkaitan dalam mendukung program eliminasi filariasis. Penelitian telah dilaksanakan di dua lokasi yang merupakan daerah sentinel yaitu Desa Potokullin, Kecamatan buntu Batu dan Desa Parombean, Kecamatan Curio Kabupaten Enrekang. Hasil penelitian menunjukkan bahwa adanya perhatian penting dari para stakeholder yang berkaitan baik itu dari sektor kesehatan maupun lintas sektor terhadap pelaksanaan eliminasi filariasis di Kabupaten Enrekang. Sebagian besar persepsi stakeholder sudah mengetahui apa itu filariasis, apa bahayanya dan bagaimana cara pencegahannya. Namun perlu advokasi lebih gencar dari tenaga promosi kesehatan agar mendapat dukungan dari para stakeholder yang terlibat dalam menyukseskan program eliminasi filariasis di Kabupaten Enrekang.
APA, Harvard, Vancouver, ISO, and other styles
49

Thodberg, Karen, Louisa M. Gould, Susanne Støier, Inger Anneberg, Peter T. Thomsen, and Mette S. Herskin. "Experiences and opinions of Danish livestock drivers transporting sows regarding fitness for transport and management choices relevant for animal welfare." Translational Animal Science 4, no. 2 (February 6, 2020): 1070–81. http://dx.doi.org/10.1093/tas/txaa015.

Full text
Abstract:
Abstract Including Denmark, modern pig production typically involves annual culling rates close to 50%. One important professional group in this process are livestock drivers transporting the animals to slaughter. By use of oral interviews, we aimed to describe experiences and opinions of Danish livestock drivers transporting sows, regarding fitness for transport and management choices relevant for animal welfare. All livestock drivers (N = 30) associated with a large slaughterhouse in Denmark accepting sows were approached in person, after having unloaded sows, and asked questions by an interviewer. A total of 22 livestock drivers (73%) answered all questions, constituting of a heterogeneous group of men of varying age, level of experience, time since they achieved the legally required certificate of competence, and daily involvement in sow transportation. Among livestock drivers included in the present study, doubt about fitness for transport was not uncommon, and specific reasons underlying their doubt were listed. All respondents reported to have experienced having to reject loading a cull sow who had been selected for slaughter by a herd manager, and approximately 40% did this several times a year. In contrast, almost 50% had never experienced having a sow rejected by the veterinarian at the slaughterhouse due to lack of fitness for transport. When asked about their management of sows during transportation, the majority (71%) reported using special condition transport (use of extra bedding and partitions to separate individual sows from rest of the load) less than once per month. All respondents considered hot days a problem for welfare of sows and the majority reported to adjust air intake of trucks daily or several times per week. In addition, approximately half of the respondents mentioned stationary periods (e.g., mandatory driver rests) as a challenge to sow welfare, to a degree where they had violated regulation on mandatory driver rests for the sake of welfare of the sows. The present study is among the few to focus on livestock drivers transporting sows, including questions about management choices and the animals’ fitness for transport. The findings may form basis for future development of educational programs for drivers as well as for the formulation of hypotheses for future studies in this area, characterized by complicated underlying legislation and challenges to animal welfare.
APA, Harvard, Vancouver, ISO, and other styles
50

Journal, Baghdad Science. "The Impact of Operating System on Bandwidth in Open VPN Technology." Baghdad Science Journal 13, no. 1 (March 6, 2016): 204–11. http://dx.doi.org/10.21123/bsj.13.1.204-211.

Full text
Abstract:
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography