Olena V. Narimanova
Full Text Available Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for implementation, does not require the external changes of product packaging, does not affect existing production process. The technology can be recommended for the use to private businesses and government institutions that are interested in the security of their products from counterfeiting, as well as tracking and removing from circulation the counterfeit consumer products.
Duerksen, Gary L.; Miller, Seth A.
Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.
Shokralla, Shadi; Hellberg, Rosalee S; Handy, Sara M; King, Ian; Hajibabaei, Mehrdad
Species substitution is a form of seafood fraud for the purpose of economic gain. DNA barcoding utilizes species-specific DNA sequence information for specimen identification. Previous work has established the usability of short DNA sequences-mini-barcodes-for identification of specimens harboring degraded DNA. This study aims at establishing a DNA mini-barcoding system for all fish species commonly used in processed fish products in North America. Six mini-barcode primer pairs targeting short (127-314 bp) fragments of the cytochrome c oxidase I (CO1) DNA barcode region were developed by examining over 8,000 DNA barcodes from species in the U.S. Food and Drug Administration (FDA) Seafood List. The mini-barcode primer pairs were then tested against 44 processed fish products representing a range of species and product types. Of the 44 products, 41 (93.2%) could be identified at the species or genus level. The greatest mini-barcoding success rate found with an individual primer pair was 88.6% compared to 20.5% success rate achieved by the full-length DNA barcode primers. Overall, this study presents a mini-barcoding system that can be used to identify a wide range of fish species in commercial products and may be utilized in high throughput DNA sequencing for authentication of heavily processed fish products.
Sandia National Laboratories developed an Authenticated Secure Container System (ASCS) for the International Atomic Energy Agency (IAEA). Agency standard weights and safeguards samples can be stored in the ASCS to provide continuity of knowledge. The ASCS consists of an optically clear cover, a base containing the Authenticated Item Monitoring System (AIMS) transmitter, and the AIMS receiver unit for data collection. The ASCS will provide the Inspector with information concerning the status of the system, during a surveillance period, such as state of health, tampering attempts, and movement of the container system. The secure container is located inside a Glove Box with the receiver located remotely from the Glove Box. AIMS technology uses rf transmission from the secure container to the receiver to provide a record of state of health and tampering. The data is stored in the receiver for analysis by the Inspector during a future inspection visit. 2 refs
Fatema A. Shaikh*; Prof.S.O.Rajankar
A biometric authentication system acquires biometric sample such as fingerprint. The fingerprint signifies physiological features of an individual.This is a system which maintains the attendance records of students automatically. In this designing of an efficient module that comprises of a fingerprint sensor to manage the attendance records of students. This module enrolls the student’s as well as staff’s fingerprints. This enrolling is a onetime process and their fingerprints will be stored...
De Jesus, A.S.M.
The falsification of valuable gold items is a threat to the authenticity of gold products. To solve this, there is a continuous search for reliable, practicle and cost-effective means of identifying forgeries. Because nuclear techniques as applied to elemental analysis have a high degree of specificity, are non-destructive and permit the availability of results within a relatively short time, a few of these techniques were investigated and reviewed in the article. Work on some promising methods in the author's laboratory is also discussed. Constraints such as those imposed by the time taken by the measurement, negligible residual activity within a relatively short time were also considered. The techniques that were investigated include: the transmission of electromagnetic radiation through a medium; scattering of electromagnetic radiation; x-ray fluorescence analysis; neutron activation analysis; activation by the inelastic scattering of gamma radiation; activation by the inelastic scattering of fast neutrons; absorption and scattering of fast neutrons; self-attenuation of gamma radiation. The shape of the object being investigated, should also be considered. It is concluded that a system based on the inelastic scattering of neutrons emitted by a 241 Am/Be source (halflife = 433 years) is practical and capable of authenticating gold and gold alloy coins such as Krugerrands. The feasibility study on the assaying of gold jewelry by means of nuclear methods also showed it to be impractical
Armstrong, Robert C; Hutchinson, Robert L
Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.
Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos
We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...
Mathew, Gloriya; Thomas, Shiney
User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human users. Password authentication systems will be either been usable but not secure, or secure but not usable. While there are different types of authentication systems available alphanumeric password is the most commonly used authentication mechanism. But this method has significant drawbacks. An alternative solution to the text based authenti...
Tao, Q.; Veldhuis, Raymond N.J.
We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information
Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.
Noori Hoshyar, Azadeh; Sulaiman, Riza
Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.
Hariri, Mahdi; Shokouhi, Shahriar Baradaran
Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.
Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran
As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.
Ekaterina Yurievna Gourina
Full Text Available Systems of remote education (RE are now widespread. These systems are convenient in terms of simplicity, efficiency of education, costs, opportunities to study with a teacher when you are in different parts of the globe, to attend online lectures and seminars. The information circulating in this system is a source of making money for its owner, which of course does not want the system (and the information in it to be used by not authorized users. In this article methods of authentication in such systems is discussed, because you can put a firewall, encrypt data transmissions, etc., but if there will be free access to the server, where all the information is held — it will all be useless.
Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning
In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... and present a mobile prototype system capable of authenticating users based on the uniqueness of their brainwaves. Furthermore, we implement a novel authentication process, which leads the authentication system to be more secure. We also give suggestions for future improvements of the system....
Various herbal medicines have been developed and used in various parts of the world for thousands of years. Although locally grown indigenous plants were originally used for traditional herbal preparations, Western herbal products are now becoming popular in Japan with the increasing interest in health. At the same time, there are growing concerns about the substitution of ingredients and adulteration of herbal products, highlighting the need for the authentication of the origin of plants used in herbal products. This review describes studies on Cimicifuga and Vitex products developed in Europe and Japan, focusing on establishing analytical methods to evaluate the origins of material plants and finished products. These methods include a polymerase chain reaction-restriction fragment length polymorphism method and a multiplex amplification refractory mutation system method. A genome-based authentication method and liquid chromatography-mass spectrometry-based authentication for black cohosh products, and the identification of two characteristic diterpenes of agnus castus fruit and a shrub chaste tree fruit-specific triterpene derivative are also described.
Jul 22, 2015 ... methods (with various modifications) and the use of commercial kit such as Chelex ... Authenticity determination of prawn and shrimp species in commercial frozen, pre-cooked products. .... primers have equal length (23 nucleotides), GC content ..... Temperatures in Diffusion-Generated Chemical Gradients.
Nakyinsige, Khadijah; Man, Yaakob Bin Che; Sazili, Awis Qurni
In the recent years, Muslims have become increasingly concerned about the meat they eat. Proper product description is very crucial for consumers to make informed choices and to ensure fair trade, particularly in the ever growing halal food market. Globally, Muslim consumers are concerned about a number of issues concerning meat and meat products such as pork substitution, undeclared blood plasma, use of prohibited ingredients, pork intestine casings and non-halal methods of slaughter. Analytical techniques which are appropriate and specific have been developed to deal with particular issues. The most suitable technique for any particular sample is often determined by the nature of the sample itself. This paper sets out to identify what makes meat halal, highlight the halal authenticity issues that occur in meat and meat products and provide an overview of the possible analytical methods for halal authentication of meat and meat products. Copyright © 2012 Elsevier Ltd. All rights reserved.
Devaney, Mike M.; Kouzes, Richard T.; Hansen, Randy R.; Geelhood, Bruce D.
This document concentrates on the identification of a standardized assessment approach for the verification of security functionality in specific equipment, the Inspection Sampling Measurement System (ISMS) being developed for MAYAK. Specifically, an Authentication Assurance Level 3 is proposed to be reached in authenticating the ISMS
Coppa, M.; Cabiddu, A.; Elsässer, M.; Hulin, S.; Lind, V.; Martin, B.; Mosquera-Losada, M.R.; Peeters, A.; Prache, S.; Pol, van den A.; Peratoner, G.
There is increased consumer demand for food products with a perceived positive image. Product quality can be assessed in terms of food safety, nutritional composition, technological and sensory characteristics and ethics. In order to summarise the current knowledge linking quality traits and
AFRICAN JOURNALS ONLINE (AJOL) · Journals · Advanced Search · USING AJOL · RESOURCES ... access control, sensitive data protection and on-line tracking systems. ... This paper has identified such vulnerabilities and threats, particularly ... Systems, Authentication, Verification, Vulnerabilities, attacks, Threats.
S. V. Skuratov
Full Text Available Implementation of keystroke dynamics in multifactor authentication systems is described in the article. Original access control system based on totality of matchers is presented. Testing results and useful recommendations are also adduced.
Ahmad et al.
was designed on mobile android devices, but it did not provide a large choice or multiple ... password authentication system android application devices. The system adds the ..... Password, Computer Science Thesis.Paper 2.Pg 5-18. 27.
Raclariu, Ancuta Cristina; Heinrich, Michael; Ichim, Mihael Cristin; de Boer, Hugo
Herbal medicines play an important role globally in the health care sector and in industrialised countries they are often considered as an alternative to mono-substance medicines. Current quality and authentication assessment methods rely mainly on morphology and analytical phytochemistry-based methods detailed in pharmacopoeias. Herbal products however are often highly processed with numerous ingredients, and even if these analytical methods are accurate for quality control of specific lead or marker compounds, they are of limited suitability for the authentication of biological ingredients. To review the benefits and limitations of DNA barcoding and metabarcoding in complementing current herbal product authentication. Recent literature relating to DNA based authentication of medicinal plants, herbal medicines and products are summarised to provide a basic understanding of how DNA barcoding and metabarcoding can be applied to this field. Different methods of quality control and authentication have varying resolution and usefulness along the value chain of these products. DNA barcoding can be used for authenticating products based on single herbal ingredients and DNA metabarcoding for assessment of species diversity in processed products, and both methods should be used in combination with appropriate hyphenated chemical methods for quality control. DNA barcoding and metabarcoding have potential in the context of quality control of both well and poorly regulated supply systems. Standardisation of protocols for DNA barcoding and DNA sequence-based identification are necessary before DNA-based biological methods can be implemented as routine analytical approaches and approved by the competent authorities for use in regulated procedures. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd.
Ayed, D.; Bichsel, P.; Camenisch, J.; Hartog, den J.I.; Holz, T.; Ioannidis, S.
Authentication and authorisation are essential ingredients for effective protection of data in distributed information systems. Currently, they are being treated as separate components with specified input and output relations. Traditional authorisation components require all of the users’
Kim, K.-S.; Lee, Jeong-Min; Seo, Hye-Young; Kim, Jun-Hyoung; Song, Hyun-Pa; Byun, Myung-Woo; Kwon, Joong-Ho
Radiolytic products of authentic fatty acids (palmitic, stearic, oleic, linoleic and linolenic acids) and triacylglycerides (tripalmitin, tristearin, triolein, trilinolein and trilinolenin) were determined. Concentrations of hydrocarbons from the saturated fatty acids were higher than the unsaturated fatty acids. Authentic fatty acids were mainly decomposed in the α-carbon position and C n-1 hydrocarbons occurred in higher than C n-2 hydrocarbons. Concentrations of 2-alkylcyclobutanones from the saturated fatty acids were lower than the unsaturated fatty acids. Concentrations of hydrocarbons from tripalmitin and tristearin were not a significant change compared with triolein, trilinolein and trilinolenin. For all triacylglycerides except triolein, C n-1 hydrocarbons were higher than C n-2 hydrocarbons. Radioproduction rates of 2-alkylcyclobutanones from tripalmitin and tristearin were higher than triolein, trilinolein and trilinolenin
Thomas, M.; Baldwin, G.; Hymel, R.; Goncalves, J.G.M.; Dechamp, L.; ); Johnson, S.; Smejkal, A.; Linnebach, R.; Rue, M.
The Enhanced Data Authentication System (EDAS) is a secure branching concept that provides a safeguards inspectorate a copy of measurement data from operator instrumentation. Both safeguards inspector and facility operator requirements for secure branching have been established in previous work. These dictated the design and development of EDAS hardware and software. This paper presents the test plan for the EDAS prototypes, which need to demonstrate performance against the identified requirements. Sandia National Laboratories (SNL), Directorate-General for Energy (DG-Energy) in Luxembourg, and the Joint Research Centre (JRC) in Ispra will each perform different tests on the EDAS prototypes. Sandia, the developer, will perform comprehensive testing of functionality, robustness, and reliability. The JRC, as an independent technical organization, will evaluate electrical safety and other environmental factors important to facility operator acceptance. The JRC is also able to simulate field trial conditions using equipment similar to what will be used in the field trial. DG-Energy will confirm the Sandia tests and also test the interface of the EDAS prototype to the RADAR data acquisition and analysis system used by the Euratom inspectorate. The EDAS prototypes will be tested in a comprehensive field trial at the Westinghouse Springfields facility in a collaboration between Euratom inspectors and the facility operator. The field trial will support barcode and weight measurements taken related to the movements of nuclear material items entering and exiting the facility. One EDAS prototype will branch barcode scanner data, while the other will branch facility weight scale data. The branched data will be sent securely to an inspector computer, accessible to a Euratom inspector for data analysis. The field trial will test operational factors and environmental conditions. A critical outcome will be to ascertain whether the inspectorate gains an accurate picture of the
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
Full Text Available The Authenticity of meat products is very important for religious and health reasons in Iran. According to legislation in Iran, the consumption and importation of pork, horse, donkey and cat products should be banned. Therefore, the identification of meat products cannot be judged solely by its appearance. This issue led to the authenticity of bovine, sheep, pig, horse, donkey, chicken and soya (Glycine max in raw and processed meat products.In this study, specific primers were designed for the identification of pig ( base pair, donkey (325 base pair, chicken (391 base pair, sheep (499 base pair, horse (607 base pair, soya (707 base pair and bovine (853 base pair by Polymerase chain reaction. Following PCR, expected,, , 499,, and base pair fragments were detectable in pig, donkey, chicken, sheep, horse, soya and bovine, respectively. This protocol can be used for identification of raw and processed meat products in various animal species for replication to regulatory obligations for meat species safety in Iran.
Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)
A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.
Teshima, Naoya; Aoyagi, Tetsuo; Nakajima, Norihiro; Hashimoto, Kiyoharu; Manabe, Atsushi; Yuasa, Fukuko
The Authentication System Sub Group of J-PARC Information System Group completed the mapping of the several authentication methods in terms of the level of security. Of the methods, the PKI authentication method with IC card provides the Super High Security Level and will be adopted as the authentication method of several J-PARC Information Systems. We study the feasibility of this method with following four examples; (1) 'The EAP-TLS wireless LAN authentication method'. (2) 'The Web-SSL client authentication method in SSL-VPN connection'. (3) 'The PKI authentication method with a certificate issued by NAREGI-CA software stored in IC card.' (4) 'The PKI authentication method with Dual interface FeliCa card'. In each example, we confirmed the feasibility of the method in a practical way. In this report we present the details of the study. (author)
Carro-Temboury, Miguel R; Arppe, Riikka; Vosch, Tom; Sørensen, Thomas Just
Secure data encryption relies heavily on one-way functions, and copy protection relies on features that are difficult to reproduce. We present an optical authentication system based on lanthanide luminescence from physical one-way functions or physical unclonable functions (PUFs). They cannot be reproduced and thus enable unbreakable encryption. Further, PUFs will prevent counterfeiting if tags with unique PUFs are grafted onto products. We have developed an authentication system that comprises a hardware reader, image analysis, and authentication software and physical keys that we demonstrate as an anticounterfeiting system. The physical keys are PUFs made from random patterns of taggants in polymer films on glass that can be imaged following selected excitation of particular lanthanide(III) ions doped into the individual taggants. This form of excitation-selected imaging ensures that by using at least two lanthanide(III) ion dopants, the random patterns cannot be copied, because the excitation selection will fail when using any other emitter. With the developed reader and software, the random patterns are read and digitized, which allows a digital pattern to be stored. This digital pattern or digital key can be used to authenticate the physical key in anticounterfeiting or to encrypt any message. The PUF key was produced with a staggering nominal encoding capacity of 7 3600 . Although the encoding capacity of the realized authentication system reduces to 6 × 10 104 , it is more than sufficient to completely preclude counterfeiting of products.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
Full Text Available This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism.
Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.
Full Text Available Food culture is a kind of non-material culture with authenticity. To achieve sustainable development of translocal heritage and food culture, we must protect its authenticity. By selecting the cases of the Dongbeiren Flavor Dumpling Restaurant and the Daozanjia Northeast Dumpling Restaurant and using the in-depth interview method, this study discusses how northeastern Cuisine in Guangzhou balances the inheritance and innovation of authenticity, how producers and customers negotiate, and how to realize sustainable development. The main conclusions are: first, there are two different paths of translocal food culture production, which are “authentic food culture production” and “differentiated food culture production”. Second, what translocal enterprises produce is not objective authenticity, but constructive authenticity, or even existential authenticity. Third, compared with differentiated food culture production, authentic food culture production is helpful for the sustainable development of local food culture production. It protects the locality while transmitting and developing the local culture. Fourth, translocal food culture production is a process in which the producers and consumers continue to interact to maintain a state of equilibrium, which informs the sustainable development mechanism with a high degree of authenticity.
Xie, Qi; Zhang, Jun; Dong, Na
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-697] In the Matter of Certain Authentication Systems, Including Software and Handheld Electronic Devices; Notice of Commission Decision Not to... importation of certain authentication systems, including software and handheld electronic devices, by reason...
Ignatenko, T.; Willems, F.M.J.
In biometric privacy-preserving authentication systems that are based on key-binding, two terminals observe two correlated biometric sequences. The first terminal selects a secret key, which is independent of the biometric data, binds this secret key to the observed biometric sequence and
Currently, graphical password methods are available for android and other devices, but the major problem is vulnerability issue. A map graphical-based authentication system (Dheeraj et al, 2013) was designed on mobile android devices, but it did not provide a large choice or multiple sequence to user for selecting ...
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan
Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.
El-Abed , Mohamad; Giot , Romain; Hemery , Baptiste; Rosenberger , Christophe; Schwartzmann , Jean-Jacques
International audience; Despite the obvious advantages of biometric authentication systems over traditional security ones (based on tokens or passwords), they are vulnerable to attacks which may considerably decrease their security. In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems. It is based on the use of a database of common threats and vulnerabilities of biometric systems, and th...
MacArthur, Duncan W.; Hauck, Danielle K.; Thron, Jonathan L.
Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5
Report #11-P-0597, September 9, 2011. Vulnerability testing of EPA’s directory service system authentication and authorization servers conducted in March 2011 identified authentication and authorization servers with numerous vulnerabilities.
Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authenticati...
... INTERNATIONAL TRADE COMMISSION [Inv. No. 337-TA-697] In the Matter of: Certain Authentication... the sale within the United States after importation of certain authentication systems, including... importation, or the sale within the United States after importation of authentication systems, including...
Dr.N.Krishnan; A.Senthil Arumugam,
A major concern nowadays for any Biometric Credential Management System is its potential vulnerability to protect its information sources; i.e. protecting a genuine user’s template from both internal and external threats. These days’ biometric authentication systems face various risks. One of the most serious threats is the ulnerability of the template's database. An attacker with access to a reference template could try to impersonate a legitimate user by reconstructing the biometric sample...
Full Text Available The recent years have seen a rise in the number of cases of cyber-crime committed through identity theft and fraud. To address this problem, this paper uses adaptive neural-fuzzy inference system, fuzzy logic and artificial neural network to implement a multifactor authentication system through a technique of information fusion. To begin with, the identity attributes are mined using the three corpora from three major sources namely the social networks, a set of questionnaires and application forms from the various services offered both in the real and cyberspace. The statistical information generated by the corpora is then used to compose an identity attribute metric model. The composed identity attributes metrics values classified as biometrics, device metrics and pseudo metrics are then fused at the score level through a technique of information fusion in a multifactor authentication system by using each of the above artificial intelligence technologies and the results compared.
Schoeneman, J.L.; Baumann, M.J.; Fox, L.J.; Jenkins, C.D.; Perlinsk, A.W.
Sandia National Laboratories (SNL) is in the final stages of developing a Universal Authenticated Item Monitoring System (AIMS). When completed, AIMS will provide applicable agencies in the US government, and those in the International arena, with a secure and convenient method of monitoring the physical status of selected items. The benefit derived from this development activity will be the commercial availability of an item monitoring system with the capability for ''quick set-up'' monitoring, as well as long-term unattended monitoring. The AIMS includes a variety of sensors, a robust and authenticated radio frequency (RF) communication link, a Receiver Processing Unit (RPU), and an inspector-friendly personal computer (PC) interface for collecting, sorting, viewing and archiving pertinent event histories. The system will provide the capability to monitor selected items in a real-time mode, a remotely interrogated mode, and a stand-alone, unattended data collection mode. The sensor suite under development includes advanced motion sensors, interior volumetric intrusion sensors, Re-usable, In-situ Verifiable Authenticated (RIVA) fiber-optic seal sensors, generic utility sensors (to accommodate contact closure inputs), and radiation and environmental sensors. A new generation authentication algorithm recently has been developed that provides a high degree of system security 121. The AIMS has potential safeguards applications in the areas of arms control and treaty verification military asset control, International Atomic Energy Agency (IAEA) and Euratom safeguards verification activities, as well as domestic nuclear safeguard activities. Commercial applications could include high-value inventory control and security systems. This paper describes the second-generation AIMS along with its recently expanded sensor suite and enhanced data collection capabilities
Gligor, V. D.; Lindsay, B. G.
The paper presents a mechanism permitting a type manager to fabricate a migrated object representation which can be entrusted to other subsystems or transmitted outside of the control of a local computer system. The migrated object representation is signed by the type manager in such a way that the type manager's signature cannot be forged and the manager is able to authenticate its own signature. Subsequently, the type manager can retrieve the migrated representation and validate its contents before reconstructing the object in its original representation. This facility allows type managers to authenticate the contents of off-line or network storage and solves problems stemming from the hierarchical structure of the system itself.
Roy-Chowdhury, Ayan (Inventor); Baras, John S. (Inventor)
A method and system for authentication is provided. A central node for issuing certificates to a plurality of nodes associated with the central node in a network is also provided. The central node receives a first key from at least one node from among the plurality of nodes and generates a second key based on the received first key and generates a certificate for the at least one node. The generated certificate is transmitted to the at least one node.
The goal of this thesis is to introduce the main aspects of biometry, explain particular methods of biometric analysis and determine suitable methods for using in particular authentication system by multicriterial analysis. Our criteria for method analysis are: uniqueness, universality, public acceptability and policy consideration, resistence of fraud, accuracy, speed of comparison, template storage requirements, constancy of human biometric characters. The thesis deals with the effective us...
Full Text Available An object-based video authentication system, which combines watermarking, error correction coding (ECC, and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI.
Castro, R.; Lopez, D.R.; Vega, J.
PAPI is a system for providing access control to restricted information resources across the Internet. It intends to keep authentication as an issue local to the organization the user belongs to, while leaving information providers full control over the resources they offer. The authentication mechanisms are designed to be as flexible as possible, allowing each organization to use its own authentication schema, keeping user privacy, and offering information providers data enough for statistics. Moreover, access control mechanisms are transparent to the user and compatible: with the most commonly employed Web browsers (i.e., Netscape/MSIE/Mozilla/Lynx), with any HTTP based java application solution, and any operating system. This solution is being successfully used in different research organizations in Spain and Europe as a control access system to restricted resources in a transparent and single sign-on way. It is allowing mobile and external users to access to resources that are internal to organizations, contributing to remote participations in results of experiments and inter-institutional resource collaboration
Castro, R. [Spanish Research Network RedIRIS, Red.es (Edif. Bronce) Plz. Manuel Gomez Moreno s/n, 28020 Madrid (Spain)]. E-mail: email@example.com; Lopez, D.R. [Spanish Research Network RedIRIS, Red.es (Edif. Bronce) Plz. Manuel Gomez Moreno s/n, 28020 Madrid (Spain); Vega, J. [Asociacion EURATOM/CIEMAT, Avda. Complutense no. 22, 28040 Madrid (Spain)
PAPI is a system for providing access control to restricted information resources across the Internet. It intends to keep authentication as an issue local to the organization the user belongs to, while leaving information providers full control over the resources they offer. The authentication mechanisms are designed to be as flexible as possible, allowing each organization to use its own authentication schema, keeping user privacy, and offering information providers data enough for statistics. Moreover, access control mechanisms are transparent to the user and compatible: with the most commonly employed Web browsers (i.e., Netscape/MSIE/Mozilla/Lynx), with any HTTP based java application solution, and any operating system. This solution is being successfully used in different research organizations in Spain and Europe as a control access system to restricted resources in a transparent and single sign-on way. It is allowing mobile and external users to access to resources that are internal to organizations, contributing to remote participations in results of experiments and inter-institutional resource collaboration.
Internet is a source of large number of electronic services (e-services). Thisimplies that, almost every human endeavor can be carried out electronically on the ... e-relationship, e-money, e-learning, in short e-life are all products supported by the Internet. ... society, time is collapsing, and distance is no longer an obstacle.
Wulff, Tune; Nielsen, Michael Engelbrecht; Deelder, André M.
Authentication of food is a major concern worldwide to ensure that food products are correctly labeled in terms of which animals are actually processed for consumption. Normally authentication is based on species recognition by comparison of selected sequences of DNA or protein. We here present...... a new robust, proteome-wide tandem mass spectrometry method for species recognition and food product authentication. The method does not use or require any genome sequences or selection of tandem mass spectra but uses all acquired data. The experimental steps were performed in a simple, standardized...
MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory
Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit
Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C
Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability
Full Text Available The aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics’ changes over time (e.g., due to aging. The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites.
Lee, Tian-Fu; Liu, Chuan-Ming
A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.
Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...
Zeynel Erdi Karabulut
Full Text Available As new technology enables firms to perform many daily processes easier the need of authentication and authorization process is becoming an integral part of many businesses. Also mobile applications are very popular nowadays play an important role in our lives. Such demands are not only limited to Logistics Information Systems (LIS but many field of information system as well. In this study multi-dimensional authentication which consist of online biometric face detection integrated as cloud computing software as a Service (SaaS, Near Field Communication (NFC card authentication, location confirmation, and temporal data confirmation are gathered together to fulfill different scenarios of authentication needs of business. Microsoft Face API (Application Program Interface, SAAS (software as a service has been used in face recognition module of developed mobile application. The face recognition module of the mobile application has been tested with Yale Face Database. Location, temporal data and NFC card information are collected and confirmed by the mobile application for authentication and authorization. These images were tested with our facial recognition module and confusion matrices were created. The accuracy of the system after the facial recognition test was found to be 100%. NFC card, location and temporal data authentication not only further increases security level but also fulfils many business authentication scenarios successfully. To the best of our knowledge there is no other authentication model other than implemented one that has a-4-factor confirmation including biometric face identification, NFC card authentication, location confirmation and temporal data confirmation.
Iris recognition and authentication has a major issue in its code generation and verification accuracy, in order to enhance the authentication process, a binary bit sequence of iris is generated, which contain several vital information that is used to calculate the Mean Energy and Maximum Energy that goes into the eye with an ...
Lin, Yao-Chung; Varodayan, David; Girod, Bernd
We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.
Santos, Cristina; Melo, Vítor S.; Mafra, I.; Amaral, J.S.; Estevinho, Leticia M.; Oliveira, M.B.P.P.
Authenticity evaluation in meat products encompasses many issues, including the fraudulent substitution of higher commercial valued meats by cheaper meats and the presence of undeclared species. Due to its characteristic and intensive flavour and its healthier composition, game meats are considered as delicacy products and command higher prices compared to other meats, thus being susceptible targets for frauds. The manufacture of traditional meat products is a long-established practice in ...
This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.
Rodríguez-Bermúdez, Ruth; Herrero-Latorre, Carlos; López-Alonso, Marta; Losada, David E; Iglesias, Roberto; Miranda, Marta
An authentication procedure for differentiating between organic and non-organic cattle production on the basis of analysis of serum samples has been developed. For this purpose, the concentrations of fourteen mineral elements (As, Cd, Co, Cr, Cu, Fe, Hg, I, Mn, Mo, Ni, Pb, Se and Zn) in 522 serum samples from cows (341 from organic farms and 181 from non-organic farms), determined by inductively coupled plasma spectrometry, were used. The chemical information provided by serum analysis was employed to construct different pattern recognition classification models that predict the origin of each sample: organic or non-organic class. Among all classification procedures considered, the best results were obtained with the decision tree C5.0, Random Forest and AdaBoost neural networks, with hit levels close to 90% for both production types. The proposed method, involving analysis of serum samples, provided rapid, accurate in vivo classification of cattle according to organic and non-organic production type. Copyright © 2018 Elsevier Ltd. All rights reserved.
Alexey Nikolaevich Ruchay
Full Text Available This work aims to develop a prototype system of centralized managing permissions based on the election multibiometric authentication. The novelty of this work is to develop the principles of distinction and multi-factor authentication, because at the moment there is no such development. Depending on various conditions and factors, including the availability of electronic means and convenience, resistance to attacks and exploits, disease or injury of users the biometric authentication can be selected on the basis of any such biometrics as rhythm password, voice, dynamic signatures and graphics recognition.
Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.
Ali, Eaqub; Sultana, Sharmin; Hamid, Sharifah Bee Abd; Hossain, Motalib; Yehya, Wageeh A; Kader, Abdul; Bhargava, Suresh K
Gelatin is a highly purified animal protein of pig, cow, and fish origins and is extensively used in food, pharmaceuticals, and personal care products. However, the acceptability of gelatin products greatly depends on the animal sources of the gelatin. Porcine and bovine gelatins have attractive features but limited acceptance because of religious prohibitions and potential zoonotic threats, whereas fish gelatin is welcomed in all religions and cultures. Thus, source authentication is a must for gelatin products but it is greatly challenging due to the breakdown of both protein and DNA biomarkers in processed gelatins. Therefore, several methods have been proposed for gelatin identification, but a comprehensive and systematic document that includes all of the techniques does not exist. This up-to-date review addresses this research gap and presents, in an accessible format, the major gelatin source authentication techniques, which are primarily nucleic acid and protein based. Instead of presenting these methods in paragraph form which needs much attention in reading, the major methods are schematically depicted, and their comparative features are tabulated. Future technologies are forecasted, and challenges are outlined. Overall, this review paper has the merit to serve as a reference guide for the production and application of gelatin in academia and industry and will act as a platform for the development of improved methods for gelatin authentication.
Trolinger, James D.; Dioumaev, Andrei K.; Lal, Amit K.; Dimas, Dave
This paper describes an ongoing instrument development project to distinguish genuine manufactured components from counterfeit components; we call the instrument ASSURES (Authentication Sensing System Using Resonance Evaluation Spectroscopy). The system combines Laser Doppler Vibrometry with acoustical resonance spectroscopy, augmented with finite element analysis. Vibrational properties of components, such as resonant modes, damping, and spectral frequency response to various forcing functions depend strongly upon the mechanical properties of the material, including its size, shape, internal hardness, tensile strength, alloy/composite compositions, flaws, defects, and other internal material properties. Although acoustic resonant spectroscopy has seen limited application, the information rich signals in the vibrational spectra of objects provide a pathway to many new applications. Components with the same shape but made of different materials, different fatigue histories, damage, tampering, or heat treatment, will respond differently to high frequency stimulation. Laser Doppler Vibrometry offers high sensitivity and frequency bandwidth to measure the component's frequency spectrum, and overcomes many issues that limit conventional acoustical resonance spectroscopy, since the sensor laser beam can be aimed anywhere along the part as well as to multiple locations on a part in a non-contact way. ASSURES is especially promising for use in additive manufacturing technology by providing signatures as digital codes that are unique to specific objects and even to specific locations on objects. We believe that such signatures can be employed to address many important issues in the manufacturing industry. These include insuring the part meets the often very rigid specifications of the customer and being able to detect non-visible internal manufacturing defects or non-visible damage that has occurred after manufacturing.
Chrysochou, Polymeros; Traganou, Maria
Should an exported product that is produced in a specific country keep the native language on its label or not? In this study, we explore how the role of native language of an origin-labelled product impacts consumer response. Based on an online experiment with consumers in the US (N=981) using...... as stimuli an olive oil product originating from Tunisia, our findings suggest that the presence of native language on a product’s label has a positive effect on product authenticity, which, in turn, increases purchase intention. However, this process is conditional on country of origin (COO) preferences...
This project deals with authentication by a mobile device. The mobile device with the operating system Android 5.0 was chosen as authentication device. The user can perform authentication with emulation of contactless chip cards by using Host-based Card Emulation, which runs via Near Field Communication, where cryptographic keys are stored in a secure environment KeyStore. The project continues with implementation of authentication via Bluetooth LE and describes application for authentization...
Mishra, Raghavendra; Barnwal, Amit Kumar
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Hansen, Anne?Mette S.; Frandsen, Henrik L.; Fromberg, Arvid
Abstract A fast and simple method for authenticating raspberry flavors from food products was developed. The two enantiomers of the compound (E)???ionone from raspberry flavor were separated on a chiral gas chromatographic column. Based on the ratio of these two enantiomers, the naturalness of a raspberry flavor can be evaluated due to the fact that a natural flavor will consist almost exclusively of the R enantiomer, while a chemical synthesis of the same compound will result in a racemic mi...
D?Amato, Maria Eugenia; Alechine, Evguenia; Cloete, Kevin Wesley; Davison, Sean; Corach, Daniel
Background Wild animals? meat is extensively consumed in South Africa, being obtained either from ranching, farming or hunting. To test the authenticity of the commercial labels of meat products in the local market, we obtained DNA sequence information from 146 samples (14 beef and 132 game labels) for barcoding cytochrome c oxidase subunit I and partial cytochrome b and mitochondrial fragments. The reliability of species assignments were evaluated using BLAST searches in GenBank, maximum lik...
This study describes a polymerase chain reaction using restriction fragment length polymorphism (PCR-RFLP) assay based on the 16S rRNA mitochondrial gene to identify commercial food products of wide range of Penaeidae and Pandalidae shrimp species commercialised in the Tunisian market. Phylogenetic analyses ...
Lyle, Stacey D.
A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.
Israa M. Alsaadi
Full Text Available Abstract With the fast increasing of the electronic crimes and their related issues deploying a reliable user authentication system became a significant task for both of access control and securing users private data. Human biometric characteristics such as face finger iris scanning voice signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages disadvantages and future developments of each method is provided in this paper.
Fuller, J.L.; Kouzes, R.T.
Full text: Radiation measurement and systems are central to the affirmation of compliance with nuclear material control agreements associated with a variety of arms control and non-proliferation regimes. A number of radiation measurement systems are under development for this purpose, and the correct functioning of these systems will be authenticated. Authentication is the process by which a monitoring party to an agreement is assured that measurement systems are assembled as designed, function as designed, and do not contain hidden features that allow the passing of material inconsistent with an accepted declaration. Attribute measurement systems are specific examples of radiation measurement systems that are being developed in the United States and the Russian Federation. Under one bilateral agreement, the U.S. Department of Defense, Defense Threat Reduction Agency, Cooperative Threat Reduction (DoD DTRA/CTR) Program is constructing a Fissile Material Storage Facility (FMSF) at Mayak to hold up to 50 tons of plutonium from the disassembly of Russian Federation nuclear weapons. Negotiations are being held between the U.S. and the Russian Federation for cooperative development of attribute measurement systems to provide confidence that the material is of weapons origin and other purposes. Pacific Northwest National Laboratory is leading the authentication effort for U.S. interests at FMSF. There are two basic requirements for an attribute measurement system: protection of classified information, and assurance of credible performance of the system for the measurement. The technology used to protect classified information is referred to as an information barrier. An information barrier consists of technology and procedures that prevent the release of host-country classified information to a monitoring party during a joint inspection of a sensitive item. Information barriers are used on monitoring systems that are exposed to host-party classified materials
Mattord, Herbert J.
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
Wu, Qunjian; Zeng, Ying; Zhang, Chi; Tong, Li; Yan, Bin
The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. In this paper, a multi-task EEG-based person authentication system combining eye blinking is proposed, which can achieve high precision and robustness. Firstly, we design a novel EEG-based biometric evoked paradigm using self- or non-self-face rapid serial visual presentation (RSVP). The designed paradigm could obtain a distinct and stable biometric trait from EEG with a lower time cost. Secondly, the event-related potential (ERP) features and morphological features are extracted from EEG signals and eye blinking signals, respectively. Thirdly, convolutional neural network and back propagation neural network are severally designed to gain the score estimation of EEG features and eye blinking features. Finally, a score fusion technology based on least square method is proposed to get the final estimation score. The performance of multi-task authentication system is improved significantly compared to the system using EEG only, with an increasing average accuracy from 92.4% to 97.6%. Moreover, open-set authentication tests for additional imposters and permanence tests for users are conducted to simulate the practical scenarios, which have never been employed in previous EEG-based person authentication systems. A mean false accepted rate (FAR) of 3.90% and a mean false rejected rate (FRR) of 3.87% are accomplished in open-set authentication tests and permanence tests, respectively, which illustrate the open-set authentication and permanence capability of our systems.
Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.
Full Text Available Perfectly segmenting the area of the iris is one of the most important steps in iris recognition. There are several problematic areas that affect the accuracy of the iris segmentation step, such as eyelids, eyelashes, glasses, pupil (due to less accurate iris segmentation, motion blur, and lighting and specular reflections. To solve these problems, gradient magnitude and Fourier descriptor are employed to do iris segmentation in the proposed Multimodal Biometric Authentication System (MBAS. This approach showed quite promising results, i.e. an accuracy rate of 97%. The result of the iris recognition system was combined with the result of an open-source fingerprint recognition system to develop a multimodal biometrics authentication system. The results of the fusion between iris and fingerprint authentication were 99% accurate. Data from Multimedia Malaysia University (MMUI and our own prepared database, the SGU-MB-1 dataset, were used to test the accuracy of the proposed system.
Watkins, L.M.; Rundquist, D.E.
Large multicomponent Operator-provided C and S systems with computer control, such as the pioneering Japanese Fast Critical Assembly Portal Monitor (FCA P/M), can efficiently meet evolving IAEA C and S requirements but they present substantial challenges to the IAEA's need to authenticate the data produced. To authenticate such systems by traditional IAEA methods would require a prohibitive expenditure of resources to ensure that each individual component is provided with credible tamper indication and that the control and interpretation of the data is appropriate. Consequently, in parallel with the FCA P/M field trial currently underway in Japan, the IAEA has initiated a programme aimed at producing resource-efficient and credible authentication of the system. Although initially focused on the P/M system, the methods under consideration are applicable to other similar Operator-provided systems
Ono, Sawako; Nakashima, Shinichi; Iwamoto, Tomonori
The sampling for analysis from vessels and columns at the Rokkasho Reprocessing Plant (RRP) is performed mostly by the automatic sampling system. The safeguards sample for the verification also will be taken using these sampling systems and transfer to the OSL though the pneumatic transfer network owned and controlled by operator. In order to maintaining sample integrity and continuity of knowledge (CoK) for throughout the sample processing. It is essential to develop and establish the authentication measures for the automatic sampling system including transfer network. We have developed the Automatic Sampling Authentication System (ASAS) under consultation by IAEA. This paper describes structure, function and concept of ASAS. (author)
Dong, Xiaoman; Jiang, Chao; Yuan, Yuan; Peng, Daiyin; Luo, Yuqin; Zhao, Yuyang; Huang, Luqi
The accurate identification of botanical origin in commercial products is important to ensure food authenticity and safety for consumers. The Dendrobium species have long been commercialised as functional food supplements and herbal medicines in Asia. Three valuable Dendrobium species, namely Dendrobium officinale, D. huoshanense and D. moniliforme, are often mutually adulterated in trade products in pursuit of higher profit. In this paper, a rapid and reliable semi-quantitative method for identifying the botanical origin of Dendrobium products in terminal markets was developed using high-resolution melting (HRM) analysis with specific primer pairs to target the trnL-F region. The HRM analysis method detected amounts of D. moniliforme adulterants as low as 1% in D. huoshanense or D. officinale products. The results have demonstrated that HRM analysis is a fast and effective tool for the differentiation of these Dendrobium species both for their authenticity as well as for the semi-quantitative determination of the purity of their processed products. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.
Zhao, Yan; Zhang, Bin; Chen, Gang; Chen, Ailiang; Yang, Shuming; Ye, Zhihua
With the globalisation of agro-product markets and convenient transportation of food across countries and continents, the potential for distribution of mis-labelled products increases accordingly, highlighting the need for measures to identify the origin of food. High quality food with identified geographic origin is a concern not only for consumers, but also for agriculture farmers, retailers and administrative authorities. Currently, stable isotope ratio analysis in combination with other chemical methods gradually becomes a promising approach for agro-product authenticity and traceability. In the last five years, a growing number of research papers have been published on tracing agro-products by stable isotope ratio analysis and techniques combining with other instruments. In these reports, the global variety of stable isotope compositions has been investigated, including light elements such as C, N, H, O and S, and heavy isotopes variation such as Sr and B. Several factors also have been considered, including the latitude, altitude, evaporation and climate conditions. In the present paper, an overview is provided on the authenticity and traceability of the agro-products from both animal and plant sources by stable isotope ratio analysis. Copyright © 2013 Elsevier Ltd. All rights reserved.
Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo
With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.
Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
Raclariu, Ancuta Cristina; Ţebrencu, Carmen Elena; Ichim, Mihael Cristin; Ciupercǎ, Oana Teodora; Brysting, Anne Krag; de Boer, Hugo
Differences in regulatory policies between countries as well as a lack of appropriate standardized methods for the authentication and quality control of herbal products directly impact their quality and safety. Echinacea products are among the top-selling herbal products in Europe and the United States with indications for a broad range of ailments. The increased use of Echinacea species has led to concerns about adulterated products resulting from challenges in morphology-based identification, due to overlapping morphological variation, frequent hybridization between species, and deliberate adulteration. This study addressed the need for a novel analytical strategy in the authentication of herbal products. A combination of high performance thin layer chromatography (HPTLC) and DNA metabarcoding was employed. Fifty-three Echinacea herbal products marketed across Europe were tested to evaluate the accuracy of these methods in plant identification and their potential for detecting substitutes, adulterants and other unreported plant constituents. HPTLC provides high resolution in the detection of Echinacea phytochemical target compounds, but does not offer information on the other species within the product. Alternatively, we showed that the limitation of HPTLC in detecting non-targeted species can be overcome by the complementary use of DNA metabarcoding. Using DNA metabarcoding, Echinacea species were detected in 34 out of the 38 retained products (89%), but with a lack of discriminatory resolution at the species level due to the low level of molecular divergence within the Echinacea genus. All of the tested herbal products showed considerable discrepancies between ingredients listed on the label and the ones detected using DNA metabarcoding, registering an overall ingredient fidelity of only 43%. The results confirm that DNA metabarcoding can be used to test for the presence of Echinacea species and simultaneously to detect other species present in even highly
Full Text Available In the application of Biometric authentication, personal identification is regarded as an effective method for automatic recognition, with a high confidence, a person’s identity. Using multimodal biometric systems we typically get better performance compare to single biometric modality. This paper proposes the multimodal biometrics system for identity verification using two traits, i.e., speech signal and palmprint. Integrating the palmprint and speech information increases robustness of person authentication. The proposed system is designed for applications where the training data contains a speech signal and palmprint. It is well known that the performance of person authentication using only speech signal or palmprint is deteriorated by feature changes with time. The final decision is made by fusion at matching score level architecture in which feature vectors are created independently for query measures and are then compared to the enrolment templates, which are stored during database preparation.
Hansen, Anne-Mette Sølvbjerg; Frandsen, Henrik Lauritz; Fromberg, Arvid
A fast and simple method for authenticating raspberry flavors from food products was developed. The two enantiomers of the compound (E)-α-ionone from raspberry flavor were separated on a chiral gas chromatographic column. Based on the ratio of these two enantiomers the naturalness of a raspberry...... flavor can be evaluated due to the fact that a natural flavor will consist almost exclusively of the R enantiomer, while a chemical synthesis of the same compound will result in a racemic mixture. 27 food products containing raspberry flavors where investigated using SPME-chiral-GC-MS. We found raspberry...... distribution of the R and S isomer. Two products were labelled to contain natural raspberry flavors but were found to contain almost equal amounts of both enantiomers indicating a presence of synthetic raspberry flavors only. Additionally, two products labelled to contain both raspberry juice and flavor showed...
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.
Full Text Available This study investigates the effects of different levels of invariance analysis on three dimensional (3D product authenticity model (3DPAM constructs in the e- retailing context. A hypothetical retailer website presents a variety of laptops using 3D product visualisations. The proposed conceptual model achieves acceptable fit and the hypothesised paths are all valid. We empirically investigate the invariance across the subgroups to validate the results of our 3DPAM. We concluded that the 3D product authenticity model construct was invariant for our sample across different gender, level of education and study backgrounds. These findings suggested that all our subgroups conceptualised the 3DPAM similarly. Also the results show some non-invariance results for the structural and latent mean models. The gender group posits a non-invariance latent mean model. Study backgrounds group reveals a non-invariance result for the structural model. These findings allowed us to understand the 3DPAMs validity in the e-retail context. Managerial implications are explained.
Ignatenko, T.; Willems, F.M.J.
In this paper we analyze two types of biometric identification systems with protected templates that also support authentication. In the first system two terminals observe biometric enrollment and identification sequences of a number of individuals. It is the goal of these terminals to form a common
Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng
With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated. Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks. The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS. We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features
Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl
This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.
Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo
The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.
Wolford, J.K.; Geelhood, B.D.; Hamilton, V.A.; Ingraham, J.; MacArthur, D.W.; Mitchell, D.J.; Mullens, J.A.; Vanier, P. E.; White, G.K.; Whiteson, R.
The effort to define guidance for authentication of software for arms control and nuclear material transparency measurements draws on a variety of disciplines and has involved synthesizing established criteria and practices with newer methods. Challenges include the need to protect classified information that the software manipulates as well as deal with the rapid pace of innovation in the technology of nuclear material monitoring. The resulting guidance will shape the design of future systems and inform the process of authentication of instruments now being developed. This paper explores the technical issues underlying the guidance and presents its major tenets
Arshad, Hamed; Nikooghadam, Morteza
Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.
Yau, Wei-Chuen; Phan, Raphael C-W
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
O. N. Faizulaieva
Full Text Available The reasonability for the usage of computer systems user voice in the authentication process is proved. The scientific task for improving the signal/noise ratio of the user voice signal in the authentication system is considered. The object of study is the process of input and output of the voice signal of authentication system user in computer systems and networks. Methods and means for input and extraction of voice signal against external interference signals are researched. Methods for quality enhancement of user voice signal in voice authentication systems are suggested. As modern computer facilities, including mobile ones, have two-channel audio card, the usage of two microphones is proposed in the voice signal input system of authentication system. Meanwhile, the task of forming a lobe of microphone array in a desired area of voice signal registration (100 Hz to 8 kHz is solved. The usage of directional properties of the proposed microphone array gives the possibility to have the influence of external interference signals two or three times less in the frequency range from 4 to 8 kHz. The possibilities for implementation of space-time processing of the recorded signals using constant and adaptive weighting factors are investigated. The simulation results of the proposed system for input and extraction of signals during digital processing of narrowband signals are presented. The proposed solutions make it possible to improve the value of the signal/noise ratio of the useful signals recorded up to 10, ..., 20 dB under the influence of external interference signals in the frequency range from 4 to 8 kHz. The results may be useful to specialists working in the field of voice recognition and speaker’s discrimination.
Park, YoHan; Park, YoungHo
The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.
Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
Zhu, Lijuan; Liu, Jingao
This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328
Full Text Available A polymerase chain reaction–restriction fragment length polymorphism (PCR–RFLP using BseDI restriction enzyme had been applied for identifying the presence of pork in processed meat (beef sausage and chicken nugget including before and after frying. Pork sample in various levels (1%, 3%, 5%, 10%, and 25 % was prepared in a mixture with beef and chicken meats and processed for sausage and nugget. The primers CYTb1 and CYTb2 were designed in the mitochondrial cytochrome b (cyt b gene and PCR successfully amplified fragments of 359 bp. To distinguish existence of porcine species, the amplified PCR products of mitochondrial DNA were cut by BseDI restriction enzyme. The result showed pig mitochondrial DNA was cut into 131 and 228 bp fragments. The PCR-RFLP species identification assay yielded excellent results for identification of porcine species. It is a potentially reliable technique for pork detection in animal food processed products for Halal authentication.
Anee Suryani Sued; Zainah Adam; Fazliana Mohd Saaya
Plant authentication is a quality assurance process that ensures the correct plant species and plant parts are used as raw materials for herbal medicines. Identification methods employed in the authentication of herbal materials are macroscopic identification and microscopic examination. Macroscopic examination involves the comparison of morphological characters that are visible with the naked eye or under low magnification with descriptions of the plant or botanical drug in floras or monographs. Characters such as size, shape and colour of leaves (or leaf fragments), flowers or fruits are commonly used in macroscopic identification. Microscopic examination focuses on anatomical structures in the plant material that are visible only with the help of a microscope. Features such as trichome (hair) shape and structure, the arrangement of stomata in the epidermis, the presence or absence of compounds such as mucilage, starch or lignin, or the presence of tissues with characteristic cells might be used in the microscopic identifications of herbal drugs. Ficus deltoidea Jack (Moraceae) has been classified into various varieties such as var. deltoidea, var. angustifolia, var.bilobata, var. intermedia, var.kunstleri, var. motleyana, and var. trengganuensis. Morphological variations and unclear boundaries between varieties can lead to the misleading identification. Thus, correct identification of F. deltoidea varieties is important. The present study aims to examine the macroscopic morphology and microscopic anatomy of F. deltoidea var. kunstleri leaf, as the main phyto-ingredient in DELTOZIDE phyto pharmaceutical product. (author)
Nilesh A. Lal; Salendra Prasad; Mohammed Farik
Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.
Nilesh A. Lal
Full Text Available Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.
Recently the smart grid has been a hot issue in the research area. The Electric Vehicle (EV) is the most important component in the Smart Grid, having a role of the battery component with high capacity. We have thought how to introduce the EV in the housing development, and for proper operation of the smart grid systems in the housing area the authentication system is essential for the individual houses. We propose an authentication system to discriminate an individual houses, so that the account management component can appropriately operate the electrical charging and billing in the housing estate. The proposed system has an architecture to integrate the charging system outside a house and the monitoring system inside a house.
Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.
An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated,
Zúquete, André; Gomes, Helder; Cunha, João Paulo Silva
This paper describes the design and implementation of an e-Health authentication architecture using smartcards and a PKI. This architecture was developed to authenticate e-Health Professionals accessing the RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals' credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short-lived certificates and cross-certification agreements between RTS and e-Health institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional's role at their home institution for role-based authorization. Trust agreements between e-Health institutions and RTS are necessary in order to make the certificates recognized by the RTS. As a proof of concept, a prototype was implemented with Windows technology. The presented authentication architecture is intended to be applied to other medical telematic systems.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
Nessen, Merel A.; Zwaan, van der Dennis J.; Grevers, Sander; Dalebout, Hans; Staats, Martijn; Kok, Esther; Palmblad, Magnus
Proteomics methodology has seen increased application in food authentication, including tandem mass spectrometry of targeted species-specific peptides in raw, processed, or mixed food products. We have previously described an alternative principle that uses untargeted data acquisition and
Full Text Available The orzo Agordino is a very old local variety of domesticated barley (Hordeum vulgare ssp. distichum L. that is native to the Agordo District, Province of Belluno, and is widespread in the Veneto Region, Italy. Seeds of this landrace are widely used for the preparation of very famous dishes of the dolomitic culinary tradition such as barley soup, bakery products and local beer. Understanding the genetic diversity and identity of the Agordino barley landrace is a key step to establish conservation and valorisation strategies of this local variety and also to provide molecular traceability tools useful to ascertain the authenticity of its derivatives. The gene pool of the Agordino barley landrace was reconstructed using 60 phenotypically representative individual plants and its genotypic relationships with commercial varieties were investigated using 21 pure lines widely cultivated in the Veneto Region. For genomic DNA analysis, following an initial screening of 14 mapped microsatellite (SSR loci, seven discriminant markers were selected on the basis of their genomic position across linkage groups and polymorphic marker alleles per locus. The genetic identity of the local barley landrace was determined by analysing all SSR markers in a single multi-locus PCR assay. Extent of genotypic variation within the Agordino barley landrace and the genotypic differentiation between the landrace individuals and the commercial varieties was determined. Then, as few as four highly informative SSR loci were selected and used to develop a molecular traceability system exploitable to verify the genetic authenticity of food products deriving from the Agordino landrace. This genetic authentication assay was validated using both DNA pools from individual Agordino barley plants and DNA samples from Agordino barley food products. On the whole, our data support the usefulness and robustness of this DNA-based diagnostic tool for the orzo Agordino identification, which
Christensen, Laurids Siig; Hoorfar, Jeffrey; Sorensen, J.
An example of the qualities embedded in the foods produced by small companies based on small Danish islands and reflections on the association between the qualities of the products and their geographical origin is presented. This case study discusses how it can be ensured that qualities in the pr...... in the products that can be tasted and documented truly reflect geographical origin, and ways in which authenticity can be guarded and exploited in marketing while at the same time increasing production volume....
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147
Went, Kathryn L.; Gregor, Peter; Ricketts, Ian W.
Information technology has been widely promoted in the healthcare sector to improve current practice and patient safety. However, end users are seldom involved extensively in the design and development of healthcare systems, with lip service often paid to the idea of true user involvement. In this case study the impact of sustained authentic user participation was explored using an interdisciplinary team, consisting of experts both in interaction and healthcare design and consultant anaesthetists, nurses, and pharmacists, to create an electronic prescribing and administration system. This paper details the interface that was created and provides examples of the way in which the design evolved in response to the sustained authentic user participation methods. The working prototype both reduced the opportunity for user error and was preferred by its users to the existing manual system.
Une, Masashi; Otsuka, Akira; Imai, Hideki
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.
Hansen, Anne-Mette S; Frandsen, Henrik L; Fromberg, Arvid
A fast and simple method for authenticating raspberry flavors from food products was developed. The two enantiomers of the compound (E)-α-ionone from raspberry flavor were separated on a chiral gas chromatographic column. Based on the ratio of these two enantiomers, the naturalness of a raspberry flavor can be evaluated due to the fact that a natural flavor will consist almost exclusively of the R enantiomer, while a chemical synthesis of the same compound will result in a racemic mixture. Twenty-seven food products containing raspberry flavors where investigated using SPME-chiral-GC-MS. We found raspberry jam, dried raspberries, and sodas declared to contain natural aroma all contained almost only R-(E)-α-ionone supporting the content of natural raspberry aroma. Six out of eight sweets tested did not indicate a content of natural aroma on the labeling which was in agreement with the almost equal distribution of the R and S isomer. Two products were labeled to contain natural raspberry flavors but were found to contain almost equal amounts of both enantiomers indicating a presence of synthetic raspberry flavors only. Additionally, two products that were labeled to contain both raspberry juice and flavor showed equal amounts of both enantiomers, indicating the presence of synthetic flavor.
Demirhan, Yasemin; Ulca, Pelin; Senyuva, Hamide Z
A commercially available real-time PCR, based on a multi-copy target cytochrome b (cyt b) using porcine specific primers, has been validated for the Halal/Kosher authentication of gelatine. Extraction and purification of DNA from gelatine were successfully achieved using the SureFood® PREP Animal system, and real-time PCR was carried out using SureFood® Animal ID Pork Sens kit. The minimum level of adulteration that could be detected was 1.0% w/w for marshmallows and gum drops. A small survey was undertaken of processed food products such as gum drops, marshmallows and Turkish delight, believed to contain gelatine. Of fourteen food products from Germany, two samples were found to contain porcine gelatine, whereas of twenty-nine samples from Turkey twenty-eight were negative. However, one product from Turkey contained porcine DNA and thus was not Halal, and neither was the use of porcine gelatine indicated on the product label. Copyright © 2011 Elsevier Ltd. All rights reserved.
Alonso-Rebollo, Alba; Ramos-Gómez, Sonia; Busto, María D; Ortega, Natividad
The applicability of qPCR in olive-oil authentication depends on the DNA obtained from the oils and the amplification primers. Therefore, four olive-specific amplification systems based on the trnL gene were designed (A-, B-, C- and D-trnL systems). The qPCR conditions, primer concentration and annealing temperature, were optimized. The systems were tested for efficiency and sensitivity to select the most suitable for olive oil authentication. The selected system (D-trnL) demonstrated specificity toward olive in contrast to other oleaginous species (canola, soybean, sunflower, maize, peanut and coconut) and showed high sensitivity in a broad linear dynamic range (LOD and LOQ: 500ng - 0.0625pg). This qPCR system enabled detection, with high sensitivity and specificity, of olive DNA isolated from oils processed in different ways, establishing it as an efficient method for the authentication of olive oil regardless of its category. Copyright © 2017 Elsevier Ltd. All rights reserved.
SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS
The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements
Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.
Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.
Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita
Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.
Marcel, Sébastien; Mariéthoz, Johnny; Rodriguez, Yann; Cardinaux, Fabien
This paper presents a bi-modal (face and speech) authentication demonstration system that simulates the login of a user using its face and its voice. This demonstration is called BioLogin. It runs both on Linux and Windows and the Windows version is freely available for download. Bio\\-Login is implemented using an open source machine learning library and its machine vision package.
Full Text Available While mobile hosts are evolving into full-IP enabled devices, there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism in mobile communication systems beyond 3G (B3G. Work has already begun on such an all-IP end-to-end solution, commonly referred to as 4G systems. Fully fledged integration between heterogeneous networks, such as 2.5G, UMTS, WLAN, Bluetooth, and the Internet, demands fully compatible, time-tested, and reliable mechanisms to depend on. SSL protocol has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future wireless environments. In this paper, we discuss existing problems related to authentication and key agreement (AKA procedures, such as compromised authentication vectors attacks, as they appear in current 2/2.5G/3G mobile communication systems, and propose how SSL, combined with public key infrastructure (PKI elements, can be used to overcome these vulnerabilities. In this B3G environment, we perceive authentication as a service, which has to be performed at the higher protocol layers irrespective of the underlying network technology. Furthermore, we analyze the effectiveness of such a solution, based on measurements of a prototype implementation. Performance measurements indicate that SSL-based authentication can be possible in terms of service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.
We implement a biometric authentication system on the Android platform, which is based on text-dependent speaker recognition. The Android version used in the application is Android 4.0. The application makes use of the Modular Audio Recognition Framework, from which many of the algorithms are adapted in the processes of preprocessing and feature extraction. In addition, we employ the Dynamic Time Warping (DTW) algorithm for the comparison of different voice features. A training procedure is i...
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
Full Text Available In this paper, we propose a novel approach to many-to-many user authentication in heterogeneous information systems. The described solution is based on the use of wireless keys – special devices that identify the user by transmitting the requested key information over a wireless network. The key feature of the proposed approach is noninteractive operating mode that allows to use a special encryption algorithm instead of two-way authentication. The algorithm is built on the basis of existing cryptographic primitives that prevents unauthorized system participants from getting access to the data of other users, even with physical access to the memory of the key. This approach does not require computational power or the battery on the key side and does not involve the user in the authentication process that allows implementing a method on passive NFC tags. To proof the concept, software implementation of the described system was developed and a qualitative comparison of the resulting solutions with existing analogues was conducted.
Osathanunkul, Maslin; Madesis, Panagiotis; de Boer, Hugo
Medicinal plants are used as a popular alternative to synthetic drugs, both in developed and developing countries. The economic importance of the herbal and natural supplement industry is increasing every year. As the herbal industry grows, consumer safety is one issue that cannot be overlooked. Herbal products in Thai local markets are commonly sold without packaging or labels. Plant powders are stored in large bags or boxes, and therefore buying local herbal products poses a high risk of acquiring counterfeited, substituted and/or adulterated products. Due to these issues, a reliable method to authenticate products is needed. Here DNA barcoding was used in combination with High Resolution Melting analysis (Bar-HRM) to authenticate three medicinal Acanthaceae species (Acanthus ebracteatus, Andrographis paniculata and Rhinacanthus nasutus) commonly used in Thailand. The rbcL barcode was selected for use in primers design for HRM analysis to produce standard melting profiles of the selected species. Melting data from the HRM assay using the designed rbcL primers showed that the three chosen species could be distinguished from each other. HRM curves of all fifteen test samples indicated that three of tested products did not contain the indicated species. Two closely related species (A. paniculata and R. nasutus), which have a high level of morphological similarity, were interchanged with one another in three tested products. Incorrect information on packaging and labels of the tested herbal products was the cause of the results shown here. Morphological similarity among the species of interest also hindered the collection process. The Bar-HRM method developed here proved useful in aiding in the identification and authentication of herbal species in processed samples. In the future, species authentication through Bar-HRM could be used to promote consumer trust, as well as raising the quality of herbal products.
Abd Aziz Siti Hajar
Full Text Available Lembah Lenggong is a place well known amongst locals as an archaeological site; the valley has been attested as a World Heritage Site. There is an overwhelming variety of plant species that are uniquely used in their cultural and traditional cuisines including Ficus hispida (Senia. Ficus hispida is a well-known species restricted to the native people in Lembah Lenggong. It is recognized as one of the plants used specifically in the traditional cuisine of the locals, especially amongst the old folks. The plant leaves are a major part of a local traditional dish called ‘Masak Pindang’. The fruit of Ficus hispida is also edible, and consumed locally in candied form (halwa. In their traditional herbal remedies, Ficus hispida is used in treating wounds and as a medicine in post and pre natal care (maternal remedies. The desired outcome of this study is to emphasize and promote this specific species as one of the more unique products of Lembah Lenggong in a tourism aspect. The traditional knowledge and practices involving the use of Ficus hispida should be cherished and treasured by future generations to retain the authenticity of their local traditional and cultural products in the light of the awakening tourism industry.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
Biu et al.
1Department of Mathematical Sciences, Kaduna State University, Kaduna – Nigeria. (E-mail: ..... localization, the iris is in a circulation fashion then lastly, the image is saved into .... Conference on Computer Engineering Systems. Cleve, K.
PROF. OLIVER OSUAGWA
Dec 1, 2014 ... 1Department of Computer Science, Imo State University, Owerri ... potential to provide security for a variety of applications. BAS are nowadays ... access control, sensitive data protection and on-line tracking systems. Like any ...
Sindhu, R.; Vanitha, M. M.; Norman, J.
The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.
Naveena, Basappa M; Jagadeesh, Deepak S; Kamuni, Veeranna; Muthukumar, Muthupalani; Kulkarni, Vinayak V; Kiran, Mohan; Rapole, Srikanth
Fraudulent mislabelling of processed meat products on a global scale that cannot be detected using conventional techniques necessitates sensitive, robust and accurate methods of meat authentication to ensure food safety and public health. In the present study, we developed an in-gel (two-dimensional gel electrophoresis, 2DE) and OFFGEL-based proteomic method for authenticating raw and cooked water buffalo (Bubalus bubalis), sheep (Ovis aries) and goat (Caprus hircus) meat and their mixes. The matrix-assisted liquid desorption/ionization time-of-flight mass spectrometric analysis of proteins separated using 2DE or OFFGEL electrophoresis delineated species-specific peptide biomarkers derived from myosin light chain 1 and 2 (MLC1 and MLC2) of buffalo-sheep-goat meat mix in definite proportions at 98:1:1, 99:0.5:0.5 and 99.8:0.1:0.1 that were found stable to resist thermal processing. In-gel and OFFGEL-based proteomic approaches are efficient in authenticating meat mixes spiked at minimum 1.0% and 0.1% levels, respectively, in triple meat mix for both raw and cooked samples. The study demonstrated that authentication of meat from a complex mix of three closely related species requires identification of more than one species-specific peptide due to close similarity between their amino acid sequences. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.
Full Text Available This research proposes a multimodal multifeature biometric system for human recognition using two traits, that is, palmprint and iris. The purpose of this research is to analyse integration of multimodal and multifeature biometric system using feature level fusion to achieve better performance. The main aim of the proposed system is to increase the recognition accuracy using feature level fusion. The features at the feature level fusion are raw biometric data which contains rich information when compared to decision and matching score level fusion. Hence information fused at the feature level is expected to obtain improved recognition accuracy. However, information fused at feature level has the problem of curse in dimensionality; here PCA (principal component analysis is used to diminish the dimensionality of the feature sets as they are high dimensional. The proposed multimodal results were compared with other multimodal and monomodal approaches. Out of these comparisons, the multimodal multifeature palmprint iris fusion offers significant improvements in the accuracy of the suggested multimodal biometric system. The proposed algorithm is tested using created virtual multimodal database using UPOL iris database and PolyU palmprint database.
total weaponi-upport system or its components. The cost f a program element is divided: (1) re.tearch quantity of buy wili include end items igenerally ...and aircraft support such actions as: (1) I)iscontinuing in-puts to the equipment to be mintminei. IGenerally , tn( higher maintenance facilit is: (2
Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan
Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.
Kim, Kee-Won; Lee, Jae-Dong
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
Bevin, Christopher J; Fergusson, Allison J; Perry, Wade B; Janik, Leslie J; Cozzolino, Daniel
This paper reports on the development of a rapid and simple method for red wine authenticity confirmation during transport and processing; namely, a wine "fingerprinting" system. When wine is transported between two sites, a sample is taken and a mid-infrared (MIR) spectrum is obtained. One hundred sixty-one (n = 161) samples of three main red wine varieties grown in Australia, Shiraz, Cabernet Sauvignon, and Merlot, were collected from six commercial wineries across Australia and scanned in transmission on two MIR spectrophotometers located at The Hardy Wine Company's main site at Reynella, South Australia (Foss WineScan FT 120) (926-5012 cm-1). A similarity index (SI) method was used as a tool to classify wine samples on the basis of their spectral data. The results showed that high rates of classification were obtained when wine samples scanned in different instruments were analyzed. The SI has been proven to provide an acceptable measurement for authentication of red wine integrity during transportation. In five of the six winery data sets, the SI correctly classified 98% of the wines. It was also observed that less than 1% of wines were misclassified between the different wineries investigated. Further studies are needed in order to test the applicability of the SI in a commercial situation and to evaluate its potential as a rapid quality control tool for routine use to authenticate wine samples during transport.
Das, Ashok Kumar; Goswami, Adrijit
Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.
Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable. We propose a challenge-response based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.
Curty, Marcos; Santos, David J.; Perez, Esther; Garcia-Fernandez, Priscila
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated with a key of minimum length. We show that, unlike the case of classical-message quantum authentication, this is not possible
Doganay-Knapp, Kirsten; Orland, Annika; König, Gabriele M; Knöss, Werner
Herbal substances and preparations thereof play an important role in healthcare systems worldwide. Due to the variety of these products regarding origin, composition and processing procedures, appropriate methodologies for quality assessment need to be considered. A majority of herbal substances is administered as multicomponent mixtures, especially in the field of Traditional Chinese Medicine and ayurvedic medicine, but also in finished medicinal products. Quality assessment of complex mixtures of herbal substances with conventional methods is challenging. Thus, emphasis of the present work was directed on the development of complementary methods to elucidate the composition of mixtures of herbal substances and finished herbal medicinal products. An indispensable prerequisite for the safe and effective use of herbal medicines is the unequivocal authentication of the medicinal plants used therein. In this context, we investigated the potential of three different PCR-related methods in the characterization and authentication of herbal substances. A multiplex PCR assay and a quantitative PCR (qPCR) assay were established to analyze defined mixtures of the herbal substances Quercus cortex, Juglandis folium, Aristolochiae herba, Matricariae flos and Salviae miltiorrhizae radix et rhizoma and a finished herbal medicinal product. Furthermore, a standard cloning approach using universal primers targeting the ITS region was established in order to allow the investigation of herbal mixtures with unknown content. The cloning approach had some limitations regarding the detection/recovery of the components in defined mixtures of herbal substances, but the complementary use of two sets of universal primer pairs increased the detection of components out of the mixture. While the multiplex PCR did not retrace all components in the defined mixtures of herbal substances, the established qPCR resulted in simultaneous and specific detection of the five target sequences in all defined
Full Text Available The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the fingerprint acquisition phase. The Agility RC2000 board has been used to prototype the embedded device. Due its different image resolution and quality, the experimental tests have been conducted on both PolyU and FVC2002 DB2-B free databases. Experimental results show an interesting trade-off between used resources, authentication time, and accuracy rate. The best achieved false acceptance rate (FAR and false rejection rate (FRR indexes are 0% and 6.25%, respectively. The elaboration time is 62.6 ms with a working frequency of 50 MHz.
Wu, Fan; Xu, Lili
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
Woittennek, Franziska; Knobbe, Jens; Pügner, Tino; Schelinski, Uwe; Grüger, Heinrich
There is an increasing need for reliable authentication for a number of applications such as e commerce. Common authentication methods based on ownership (ID card) or knowledge factors (password, PIN) are often prone to manipulations and may therefore be not safe enough. Various inherence factor based methods like fingerprint, retinal pattern or voice identifications are considered more secure. Retina scanning in particular offers both low false rejection rate (FRR) and low false acceptance rate (FAR) with about one in a million. Images of the retina with its characteristic pattern of blood vessels can be made with either a fundus camera or laser scanning methods. The present work describes the optical design of a new compact retina laser scanner which is based on MEMS (Micro Electric Mechanical System) technology. The use of a dual axis micro scanning mirror for laser beam deflection enables a more compact and robust design compared to classical systems. The scanner exhibits a full field of view of 10° which corresponds to an area of 4 mm2 on the retinal surface surrounding the optical disc. The system works in the near infrared and is designed for use under ambient light conditions, which implies a pupil diameter of 1.5 mm. Furthermore it features a long eye relief of 30 mm so that it can be conveniently used by persons wearing glasses. The optical design requirements and the optical performance are discussed in terms of spot diagrams and ray fan plots.
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Choudhry, B.S.; Baloch, A.K.; Pathan, A.H.
The issue of secure online transactions is of almost importance in the present day world of Internet based commercial applications. Accurate authentication of a person before he or she is allowed to use a resource is very important. On the other hand biometrics is fast developing as a reliable and accurate system for person identification. Biometrics can be the answer to most of the security related problems of the online commercial world. Finger based matching and authentication systems are one of the most reliable systems that can be used for security applications. In this paper, we present a detailed description and implementation procedure for a fingerprint based matching and authentication system using Filterbank approach. The algorithm has been found to give good performance for low quality images. (author)
Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter
Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.
The Authenticated Tracking and Monitoring System (ATMS) answers the need for global monitoring of the status and location of sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items and environmental conditions. A receiver and processing unit collect a variety of sensor event data. The collected data are transmitted to the INMARSAT satellite communication system, which then sends the data to appropriate ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the safety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements. Following discussions between the Australian Safeguards Office (ASO), the US Department of Energy (DOE), and Sandia National Laboratories (SNL) in early 1995, the parties mutually agreed to conduct and evaluate a field trial prototype ATMS to track and monitor shipments of uranium ore concentrate (UOC) from an operating uranium mine in Australia to a final destination in Rotterdam, the Netherlands, with numerous stops along the way. During the months of February and March 1998, the trial was conducted on a worldwide basis, with tracking and monitoring stations located at sites in both Australia and the US. This paper describes ATMS and the trial
Idrissa, Abdourhamane; Aubert, Alain; Fournel, Thierry
Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification? In this paper, two cryptographic protocols are proposed to achieve the verification of a RAM-based system through a trusted auxiliary machine. Such a system is assumed to be composed of a RAM memory and a secure block (in practice a FPGA or a configurable microcontroller). The system is connected to an input/output interface and contains a Non Volatile Memory where the configuration data are stored. Here, except the secure block, all the blocks are exposed to attacks. At the registration stage of the first protocol, the MAC of both the secret and the configuration data, denoted M0 is computed by the mobile device without saving it then transmitted to the user in a secure environment. At the verification stage, the reader which is challenged with nonces sendsMACs / HMACs of both nonces and MAC M0 (to be recomputed), keyed with the secret. These responses are verified by the user through a trusted auxiliary MAC computer unit. Here the verifier does not need to tract a (long) list of challenge / response pairs. This makes the protocol tractable for a human verifier as its participation in the authentication process is increased. In counterpart the secret has to be shared with the auxiliary unit. This constraint is relaxed in a second protocol directly derived from Fiat-Shamir's scheme.
Full Text Available There is currently an increased consumer demand for information on herbivore production factors, particularly animal diet. To meet these demands, producers and commercial entities develop specifications via quality certifications. There is therefore a need for analytical tools that may guarantee that the specification commitments have been fully met or to help with constructing them. The present paper reviews the current state of knowledge concerning diet authentication in sheep meat and milk, the different approaches that have been investigated, some leading examples concerning the discrimination of contrasting feeding situations, together with the persistence of some diet markers in the event of changes in animals' diet. The nature of the diet strongly influences the composition of the animal tissues and products, which is due to specific compounds that are directly transferred from the feed to the end product or that are transformed or produced by rumen micro-organisms or the animal's metabolism under the effect of specific diets. Some of these compounds can therefore be used as diet markers. Compounds such as carotenoids, phenolic compounds, fatty acids, volatile compounds and ratios of oxygen, hydrogen, carbon and nitrogen stable isotope are potential tracers in meat and milk or animal tissues of animal feeding diets. Moreover, differences in meat and milk composition induce differences in their optical properties, and therefore in their spectral features, which can also be used for diet authentication. These techniques have already allowed discrimination among products obtained in contrasting feeding conditions. Intermediate situations, for example in case of modification of the animal's diet, may be less easily recognized and may require a combination of tracing methods. In particular, the persistence of tracers when animals are stall-fed a concentrate-based diet after pasture and its implications for traceability are discussed. Finally
D'Amato, Maria Eugenia; Alechine, Evguenia; Cloete, Kevin Wesley; Davison, Sean; Corach, Daniel
Wild animals' meat is extensively consumed in South Africa, being obtained either from ranching, farming or hunting. To test the authenticity of the commercial labels of meat products in the local market, we obtained DNA sequence information from 146 samples (14 beef and 132 game labels) for barcoding cytochrome c oxidase subunit I and partial cytochrome b and mitochondrial fragments. The reliability of species assignments were evaluated using BLAST searches in GenBank, maximum likelihood phylogenetic analysis and the character-based method implemented in BLOG. The Kimura-2-parameter intra- and interspecific variation was evaluated for all matched species. The combined application of similarity, phylogenetic and character-based methods proved successful in species identification. Game meat samples showed 76.5% substitution, no beef samples were substituted. The substitutions showed a variety of domestic species (cattle, horse, pig, lamb), common game species in the market (kudu, gemsbok, ostrich, impala, springbok), uncommon species in the market (giraffe, waterbuck, bushbuck, duiker, mountain zebra) and extra-continental species (kangaroo). The mountain zebra Equus zebra is an International Union for Conservation of Nature (IUCN) red listed species. We also detected Damaliscus pygargus, which is composed of two subspecies with one listed by IUCN as 'near threatened'; however, these mitochondrial fragments were insufficient to distinguish between the subspecies. The genetic distance between African ungulate species often overlaps with within-species distance in cases of recent speciation events, and strong phylogeographic structure determines within-species distances that are similar to the commonly accepted distances between species. The reliability of commercial labeling of game meat in South Africa is very poor. The extensive substitution of wild game has important implications for conservation and commerce, and for the consumers making decisions on the basis of
but a solution. Modularisation is one tool used in designing the products. Designing and controlling a production system making customized products in an economical way is not an easy task. In order to fulfil the Lean and Agile manufacturing philosophies the production is often carried out in networks. Here...
Hallberg, J; Hallberg, N; Timpka, T
Conventional smart card-based authentication systems used in health care alleviate some of the security issues in user and system authentication. Existing models still do not cover all security aspects. To enable new protective measures to be developed, an extended model of the authentication process is presented. This model includes a new entity referred to as secure server. Assuming a secure server, a method where the smart card is aware of the status of the terminal integrity verification becomes feasible. The card can then act upon this knowledge and restrict the exposure of sensitive information to the terminal as required in order to minimize the risks. The secure server model can be used to illuminate the weaknesses of current approaches and the need for extensions which alleviate the resulting risks.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
.... We will accomplish the audit objective in two phases. In this phase, we reviewed current DoD Component policies on the use of identification and authentication controls to access information systems...
Nešić, K.; Stojanović, D.; Baltić, Ž. M.
Authenticity of food is an issue that is growing in awareness and concern. Although food adulteration has been present since antiquity, it has broadened to include entire global populations as modern food supply chains have expanded, enriched and become more complex. Different forms of adulteration influence not only the quality of food products, but also may cause harmful health effects. Meat and meat products are often subjected to counterfeiting, mislabelling and similar fraudulent activities, while substitutions of meat ingredients with other animal species is one among many forms of food fraud. Feed is also subject to testing for the presence of different animal species, but as part of the eradication process of transmissible spongiform encephalopathies (TSE). In both food and feed cases, the final goal is consumer protection, which should be provided by quick, precise and specific tools. Several analytical tests have been employed for such needs. This paper provides an overview of authentication of meat and meat products compared with species identification in feed control, highlighting the most prevalent laboratory methods.
Hedberg, Thomas D; Krima, Sylvere; Camelio, Jaime A
Exchange and reuse of three-dimensional (3D)-product models are hampered by the absence of trust in product-lifecycle-data quality. The root cause of the missing trust is years of "silo" functions (e.g., engineering, manufacturing, quality assurance) using independent and disconnected processes. Those disconnected processes result in data exchanges that do not contain all of the required information for each downstream lifecycle process, which inhibits the reuse of product data and results in duplicate data. The X.509 standard, maintained by the Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T), was first issued in 1988. Although originally intended as the authentication framework for the X.500 series for electronic directory services, the X.509 framework is used in a wide range of implementations outside the originally intended paradigm. These implementations range from encrypting websites to software-code signing, yet X.509 certificate use has not widely penetrated engineering and product realms. Our approach is not trying to provide security mechanisms, but equally as important, our method aims to provide insight into what is happening with product data to support trusting the data. This paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, and traceability of product data. This paper also describes an application within the Aerospace domain. Finally, the paper draws conclusions and provides recommendations for further research into using X.509 certificates in product lifecycle management (PLM) workflows to enable a product lifecycle of trust.
A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.
Departing from Product Development models based on physical artefacts. Moving towards integrated Product Development and System Operations models suited Product/Service-systems......Departing from Product Development models based on physical artefacts. Moving towards integrated Product Development and System Operations models suited Product/Service-systems...
Ogawa, Hironobu; Mukaiyama, Takehiko
The advanced comprehensive containment and surveillance system for the Fast Critical Assembly facility (FCA) of the Japan Atomic Energy Research Institute (JAERI) consists of a Portal monitor (P/M) and a Penetration Monitor (PN/M) systems. The development of these systems was completed in 1988 for alleviating the burdens of manpower and radiation problems in the frequent NDA inspections. After the completion of the field trial test (Phase III), in 1990, the International Atomic Energy Agency (IAEA) accepted the system on condition that an independent IAEA authentication equipment would be provided. The development of the authentication measures was carried out jointly by both the Japan Support Programme for Agency Safeguards (JASPAS) and the U.S. Program of Technical Assistance to IAEA Safeguards (POTAS), and also under the research agreement for the safeguards research and development between JAERI and the US Department of Energy (USDOE). The concept and design requirements of the authentication system were developed by IAEA, but the design and development of the authentication equipment were jointly funded both by JASPAS and POTAS, and also the fund of JAERI was provided for the Sandia National Laboratories (SNL) through USDOE. SNL developed and constructed the authentication system in two phase as Phase I and Phase II. JAERI financed the development of the Phase I and Phase II hardware and software, and the installation of the authentication equipment at the FCA facility, and also carried out the modification of the circuitry and devices for both the P/M and the PN/M systems as well as the reconstruction of the PN/M Junction Unit for compatibility with the implementation of the authentication measures. After the completion of consecutive field trial test of the P/M, the PN/M and the authentication system, IAEA accepted the entire system as an effective and efficient routine inspection measures in 1996. This report describes the modification and reconstruction of
Full Text Available One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core feature...
Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin
The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.
Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.
Neeraj A. Sharma
Full Text Available Authentication factors refer to user login credentials that a user supplies to an authentication process for it to decide whether to grant or deny access. While two-factor and three-factor authentication generally provides better security than one-factor authentication the aim of this paper is to review security in individual authentication factor credentials that are in use nowadays. These credentials will be discussed in factor categories knowledge factor possession factor and inherence factor. The paper details current security gaps and some novel approaches to diminish the gaps in these authentication factors. We believe that our recommendations will inspire development of better authentication credentials and systems.
Tait, Bobby L.
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
Y. A. Gatchin
Full Text Available Subject of Research.This paper presents solution of authentication problem for all components of information interoperabilityin process of operation system network loading on thin client from terminal server. System Definition. In the proposed solution operation system integrity check is made by hardware-software module, including USB-token with protected memory for secure storage of cryptographic keys and loader. The key requirement for the solution is mutual authentication of four participants: terminal server, thin client, token and user. We have created two algorithms for the problem solution. The first of the designed algorithms compares the encrypted one-time password (random number with the reference value stored in the memory of the token and updates this number in case of successful authentication. The second algorithm uses the public and private keys of the token and the server. As a result of cryptographic transformation, participants are authenticated and the secure channel is formed between the token, thin client and terminal server. Main Results. Additional research was carried out to find out if the designed algorithms meet the necessary requirements. Criteria used included applicability in a multi-access terminal system architecture, potential threats evaluation and overall system security. According to analysis results, it is recommended to use the algorithm based on PKI due to its high scalability and usability. High level of data security is proved as a result of asymmetric cryptography application with the guarantee that participants' private keys are never sent in the authentication process. Practical Relevance. The designed PKI-based algorithm allows solving the problem with the use of cryptographic algorithms according to state standard even in its absence on asymmetric cryptography. Thus, it can be applied in the State Information Systems with increased requirements to information security.
Riley, Chris; Johnson, Graham; McCracken, Heather; Al-Saffar, Ahmed
Biometric authentication is the process of establishing an individual’s identity through measurable characteristics of their behaviour, anatomy or physiology. Biometric technologies, such as fingerprint systems, are increasingly being used in a diverse range of contexts from immigration control, to banking and personal computing. As is often the case with emerging technologies, the usability aspects of system design have received less attention than technical aspects. Fingerprint systems pose a number of challenges for users and past research has identified issues with correct finger placement, system feedback and instruction. This paper describes the development of an interface for fingerprint systems using an iterative, participative design approach. During this process, several different methods for the presentation of instruction and feedback were identified. The different types of instruction and feedback were tested in a study involving 82 participants. The results showed that feedback had a statistically significant effect on overall system performance, but instruction did not. The design recommendations emerging from this study, and the use of participatory design in this context, are discussed.
Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D.
In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. PMID:27463718
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
Osathanunkul, Maslin; Suwannapoom, Chatmongkon; Khamyong, Nuttaluck; Pintakum, Danupol; Lamphun, Santisuk Na; Triwitayakorn, Kanokporn; Osathanunkul, Kitisak; Madesis, Panagiotis
Andrographis paniculata Nees is a medicinal plant with multiple pharmacological properties. It has been used over many centuries as a household remedy. A. paniculata products sold on the markets are in processed forms so it is difficult to authenticate. Therefore buying the herbal products poses a high-risk of acquiring counterfeited, substituted and/or adulterated products. Due to these issues, a reliable method to authenticate products is needed. High resolution melting analysis coupled with DNA barcoding (Bar-HRM) was applied to detect adulteration in commercial herbal products. The rbcL barcode was selected to use in primers design for HRM analysis to produce standard melting profile of A. paniculata species. DNA of the tested commercial products was isolated and their melting profiles were then generated and compared with the standard A. paniculata. The melting profiles of the rbcL amplicons of the three closely related herbal species (A. paniculata, Acanthus ebracteatus and Rhinacanthus nasutus) are clearly separated so that they can be distinguished by the developed method. The method was then used to authenticate commercial herbal products. HRM curves of all 10 samples tested are similar to A. paniculata which indicated that all tested products were contained the correct species as labeled. The method described in this study has been proved to be useful in aiding identification and/or authenticating A. paniculata. This Bar-HRM analysis has allowed us easily to determine the A. paniculata species in herbal products on the markets even they are in processed forms. We propose the use of DNA barcoding combined with High Resolution Melting analysis for authenticating of Andrographis paniculata products.The developed method can be used regardless of the type of the DNA template (fresh or dried tissue, leaf, and stem).rbcL region was chosen for the analysis and work well with our samplesWe can easily determine the A. paniculata species in herbal products tested
Li, Qi (Peter)
This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...
Karunathilaka, Sanjeewa R; Kia, Ali-Reza Fardin; Srigley, Cynthia; Chung, Jin Kyu; Mossoba, Magdi M
A rapid tool for evaluating authenticity was developed and applied to the screening of extra virgin olive oil (EVOO) retail products by using Fourier-transform near infrared (FT-NIR) spectroscopy in combination with univariate and multivariate data analysis methods. Using disposable glass tubes, spectra for 62 reference EVOO, 10 edible oil adulterants, 20 blends consisting of EVOO spiked with adulterants, 88 retail EVOO products and other test samples were rapidly measured in the transmission mode without any sample preparation. The univariate conformity index (CI) and the multivariate supervised soft independent modeling of class analogy (SIMCA) classification tool were used to analyze the various olive oil products which were tested for authenticity against a library of reference EVOO. Better discrimination between the authentic EVOO and some commercial EVOO products was observed with SIMCA than with CI analysis. Approximately 61% of all EVOO commercial products were flagged by SIMCA analysis, suggesting that further analysis be performed to identify quality issues and/or potential adulterants. Due to its simplicity and speed, FT-NIR spectroscopy in combination with multivariate data analysis can be used as a complementary tool to conventional official methods of analysis to rapidly flag EVOO products that may not belong to the class of authentic EVOO. Published 2016. This article is a U.S. Government work and is in the public domain in the USA.
Arshad, Hamed; Rasoolzadegan, Abbas
Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.
Wagner, Michael F; Skowronski, John J
Two studies assessed the extent to which people incorporated false facts provided by bogus others into their own recognition memory reports, and how these false memory reports were affected by: (a) truth of the information in others' summaries supporting the false facts, (b) motivation to process stories and summaries, (c) source credibility, and (d) ease of remembering original facts. False memory report frequency increased when false facts in a summary were supported by true information and varied inversely with the ease with which original facts could be remembered. Results from a measure probing participants' memory perceptions suggest that some false memories are authentic: People sometimes lack awareness of both the incorporation of false facts into their memory reports and where the false facts came from. However, many false memories are inauthentic: Despite reporting a false memory, people sometimes retain knowledge of the original stimulus and/or the origin of false facts. Copyright © 2017. Published by Elsevier Inc.
Full Text Available Animal DNA barcoding allows researchers to identify different species by analyzing a short nucleotide sequence, typically the mitochondrial gene cox1. In this paper, we use DNA barcoding to genetically identify seafood samples that were purchased from various locations throughout Italy. We adopted a multi-locus approach to analyze the cob, 16S-rDNA and cox1 genes, and compared our sequences to reference sequences in the BOLD and GenBank online databases. Our method is a rapid and robust technique that can be used to genetically identify crustaceans, mollusks and fishes. This approach could be applied in the future for conservation, particularly for monitoring illegal trade of protected and endangered species. Additionally, this method could be used for authentication in order to detect mislabeling of commercially processed seafood.
LIU Xuening; YIN Hao; LIN Chuang; DU Changlai
Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.
Xiong, Hu; Tao, Junyi; Chen, Yanan
Nowadays people can get many services including health-care services from distributed information systems remotely via public network. By considering that these systems are built on public network, they are vulnerable to many malicious attacks. Hence it is necessary to introduce an effective mechanism to protect both users and severs. Recently many two-factor authentication schemes have been proposed to achieve this goal. In 2016, Li et al. demonstrated that Lee et al.'s scheme was not satisfactory to be deployed in practice because of its security weaknesses and then proposed a security enhanced scheme to overcome these drawbacks. In this paper, we analyze Li et al.'s scheme is still not satisfactory to be applied in telecare medicine information systems (TMIS) because it fails to withstand off-line dictionary attack and known session-specific temporary information attack. Moreover, their scheme cannot provide card revocation services for lost smart card. In order to solve these security problems, we propose an improved scheme. Then we analyze our scheme by using BAN-logic model and compare the improved scheme with related schemes to prove that our scheme is advantageous to be applied in practice.
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos
Full Text Available The concept of two-factor multiserver authentication protocol was developed to avoid multiple number of registrations using multiple smart-cards and passwords. Recently, a variety of two-factor multiserver authentication protocols have been developed. It is observed that the existing RSA-based multiserver authentication protocols are not suitable in terms of computation complexities and security attacks. To provide lower complexities and security resilience against known attacks, this article proposes a two-factor (password and smart-card user authentication protocol with the RSA cryptosystem for multiserver environments. The comprehensive security discussion proved that the known security attacks are eliminated in our protocol. Besides, our protocol supports session key agreement and mutual authentication between the application server and the user. We analyze the proof of correctness of the mutual authentication and freshness of session key using the BAN logic model. The experimental outcomes obtained through simulation of the Automated Validation of Internet Security Protocols and Applications (AVISPA S/W show that our protocol is secured. We consider the computation, communication, and storage costs and the comparative explanations show that our protocol is flexible and efficient compared with protocols. In addition, our protocol offers security resilience against known attacks and provides lower computation complexities than existing protocols. Additionally, the protocol offers password change facility to the authorized user.
Nessen, Merel A; van der Zwaan, Dennis J; Grevers, Sander; Dalebout, Hans; Staats, Martijn; Kok, Esther; Palmblad, Magnus
Proteomics methodology has seen increased application in food authentication, including tandem mass spectrometry of targeted species-specific peptides in raw, processed, or mixed food products. We have previously described an alternative principle that uses untargeted data acquisition and spectral library matching, essentially spectral counting, to compare and identify samples without the need for genomic sequence information in food species populations. Here, we present an interlaboratory comparison demonstrating how a method based on this principle performs in a realistic context. We also increasingly challenge the method by using data from different types of mass spectrometers, by trying to distinguish closely related and commercially important flatfish, and by analyzing heavily contaminated samples. The method was found to be robust in different laboratories, and 94-97% of the analyzed samples were correctly identified, including all processed and contaminated samples.
S V Sheela; K R Radhika
The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determine...
Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory
Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.
MacArthur, D.W.; Wolford, J.K.
Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.
S K Hafizul Islam
Full Text Available Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1 the correctness of identity and password are not verified during the login and password change phases; (2 it is vulnerable to impersonation attack and privileged-insider attack; (3 it is designed without the revocation of lost/stolen smart card; (4 the explicit key confirmation and the no key control properties are absent, and (5 user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.
Full Text Available The intersubject dependencies of false nonmatch rates were investigated for a minutiae-based biometric authentication process using single enrollment and verification measurements. A large number of genuine comparison scores were subjected to statistical inference tests that indicated that the number of false nonmatches depends on the subject and finger under test. This result was also observed if subjects associated with failures to enroll were excluded from the test set. The majority of the population (about 90% showed a false nonmatch rate that was considerably smaller than the average false nonmatch rate of the complete population. The remaining 10% could be characterized as “goats” due to their relatively high probability for a false nonmatch. The image quality reported by the template extraction module only weakly correlated with the genuine comparison scores. When multiple verification attempts were investigated, only a limited benefit was observed for “goats,” since the conditional probability for a false nonmatch given earlier nonsuccessful attempts increased with the number of attempts. These observations suggest that (1 there is a need for improved identification of “goats” during enrollment (e.g., using dedicated signal-driven analysis and classification methods and/or the use of multiple enrollment images and (2 there should be alternative means for identity verification in the biometric system under test in case of two subsequent false nonmatches.
Full Text Available The authentication of extra virgin olive oils from different regions of Spain, Italy and Portugal, by means of their fatty acids, alcohols, sterols, methyl sterols and hydrocarbons content, has been investigated. Multivariate statistical methods and Evidence's Theory were applied. The comparative study shows greater predictive ability using this theory than the traditional statistical methods or expert systems that do not implement the possibility theory. A detailed and exhaustive study of Italian (Tuscany and Basilicata, Portuguese and Spanish virgin olive oils has been made. Geographically coloured maps of the studied regions are shown to strengthen the numerical results.
Se ha estudiado la autentificación de aceites de oliva virgen de diferentes regiones de España, Italia y Portugal, por su contenido en ácidos grasos, alcoholes, esteroles, metil esteroles e hidrocarburos. Se aplicaron métodos estadísticos multivariantes junto a la Teoría de la Evidencia. El estudio mostró una mejora en la capacidad predictiva utilizando esta teoría frente a otros métodos o sistemas expertos que no implementan la teoría de la posibilidad. Se ha realizado un estudio detallado y exhaustivo con aceites de oliva virgen italianos (Toscana y Basilicata, portugueses y españoles. Los resultados numéricos se muestran sobre mapas geográficos de las diferentes regiones estudiadas.
Pedersen, Jørgen Lindgaard; Edwards, Kasper
Twelve companies have been interviewed with the purpose to get information about technical, economic and organisational matters in respect of Product Configuration Systems (PCS).Combinations of qualitative interviews and quantitative scoring have been used in ranking expected and realized results...
Furia, Emilia; Naccarato, Attilio; Sindona, Giovanni; Stabile, Gaetano; Tagarelli, Antonio
Tropea red onion ( Allium cepa L. var. Tropea) is among the most highly appreciated Italian products. It is cultivated in specific areas of Calabria and, due to its characteristics, was recently awarded with the protected geographical indications (PGI) certification from the European Union. A reliable classification of onion samples in groups corresponding to "Tropea" and "non-Tropea" categories is now available to the producers. This important goal has been achieved through the evaluation of three supervised chemometric approaches. Onion samples with PGI brand (120) and onion samples not cultivated following the production regulations (80) were digested by a closed-vessel microwave oven system. ICP-MS equipped with a dynamic reaction cell was used to determine the concentrations of 25 elements (Al, Ba, Ca, Cd, Ce, Cr, Dy, Eu, Fe, Ga, Gd, Ho, La, Mg, Mn, Na, Nd, Ni, Pr, Rb, Sm, Sr, Tl, Y, and Zn). The multielement fingerprint was processed using linear discriminant analysis (LDA) (standard and stepwise), soft independent modeling of class analogy (SIMCA), and back-propagation artificial neural network (BP-ANN). The cross-validation procedure has shown good results in terms of the prediction ability for all of the chemometric models: standard LDA, 94.0%; stepwise LDA, 94.5%; SIMCA, 95.5%; and BP-ANN, 91.5%.
Siebenlist, Frank [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Bernholdt, David E. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Williams, Dean N. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Climate scientists face an overarching need to efficiently access and manipulate climate model data. Increasingly, researchers must assemble and analyze large datasets that are archived in different formats on disparate platforms and must extract portions of datasets to compute statistical or diagnostic metrics in place. The need for a common virtual environment in which to access both climate model datasets and analysis tools is therefore keenly felt. The software infrastructure to support such an environment must not only provide ready access to climate data but must also facilitate the use of visualization software, diagnostic algorithms, and related resources. To this end, the Earth System Grid Center for Enabling Technologies (ESG-CET) was established in 2006 by the Scientific Discovery through Advanced Computing program of the U.S. Department of Energy through the Office of Advanced Scientific Computing Research and the Office Biological and Environmental Research within the Office of Science. ESG-CET is working to advance climate science by developing computational resources for accessing and managing model data that are physically located in distributed multiplatform archives. In this paper, we discuss recent development and implementation efforts by the Earth System Grid (ESG) concerning its security infrastructure. ESG's requirements are to make user logon as easy as possible and to facilitate the integration of security services and Grid components for both developers and system administrators. To meet that goal, we leverage existing primary authentication mechanisms, deploy a 'lightweight' but secure OpenID WebSSO, deploy a 'lightweight' X.509-PKI, and use autoprovisioning to ease the burden of security configuration management. We are close to completing the associated development and deployment.
Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Ingwar, Mads Ingerslew; Jensen, Christian D.
This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram
Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.
McGettigan, C; Walsh, E; Jessop, R; Agnew, Z K; Sauter, D A; Warren, J E; Scott, S K
Humans express laughter differently depending on the context: polite titters of agreement are very different from explosions of mirth. Using functional MRI, we explored the neural responses during passive listening to authentic amusement laughter and controlled, voluntary laughter. We found greater activity in anterior medial prefrontal cortex (amPFC) to the deliberate, Emitted Laughs, suggesting an obligatory attempt to determine others' mental states when laughter is perceived as less genuine. In contrast, passive perception of authentic Evoked Laughs was associated with greater activity in bilateral superior temporal gyri. An individual differences analysis found that greater accuracy on a post hoc test of authenticity judgments of laughter predicted the magnitude of passive listening responses to laughter in amPFC, as well as several regions in sensorimotor cortex (in line with simulation accounts of emotion perception). These medial prefrontal and sensorimotor sites showed enhanced positive connectivity with cortical and subcortical regions during listening to involuntary laughter, indicating a complex set of interacting systems supporting the automatic emotional evaluation of heard vocalizations. © The Author 2013. Published by Oxford University Press.
Das, Ashok Kumar
Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.
Booker, Anthony; Agapouda, Anastasia; Frommenwiler, Débora A; Scotti, Francesca; Reich, Eike; Heinrich, Michael
St John's wort products (Hypericum perforatum L.) are widely available for sale in many countries including the UK via the internet. In the UK, these products are required to hold either a marketing authorisation or Traditional herbal registration (THR) to be sold legally. The THR and other regulatory schemes help to ensure product safety and quality providing an example of best practice but there is a risk if both regulated and un-regulated products continue to be available to consumers. The project is embedded in a larger study aiming to investigate the quality of different herbal medicinal products along diverse value chains. Here we focus on a comparison of the quality of the finished products and assess phytochemical variation between registered products (THRs) and products obtained from the market without any registration. 47 commercial products (granulated powders and extracts) were sourced from different suppliers. We analysed these samples using high performance thin layer chromatography (HPTLC) and 1 H NMR spectroscopy coupled with multi-variate analysis software following a method previously developed by our group. The consistency of the products varies significantly. Adulteration of the products (36%), possibly with other Hypericum species obtained from China or use of chemically distinct H. perforatum cultivars or chemotypes, and adulteration of the products (19%) with food dyes (tartrazine, amaranth, brilliant blue, sunset yellow) were the principle findings of this study. There is significant compositional variation among commercial finished products and two main causative quality problems were identified as adulteration by incorrect species or adulteration with food dyes. Generally, food supplements and unlicensed products were found to be of poorer quality than the regulated ones including THRs. Copyright © 2017 Elsevier GmbH. All rights reserved.
Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system
U.S. Environmental Protection Agency — The Pesticide Product Label System (PPLS) provides a collection of pesticide product labels (Adobe PDF format) that have been approved by EPA under Section 3 of the...
Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.
O. N. Faizulaieva
Full Text Available Scientific task for improving the signal-to-noise ratio for user’s voice signal in computer systems and networks during the process of user’s voice authentication is considered. The object of study is the process of input and extraction of the voice signal of authentication system user in computer systems and networks. Methods and means for input and extraction of the voice signal on the background of external interference signals are investigated. Ways for quality improving of the user’s voice signal in systems of voice authentication are investigated experimentally. Firmware means for experimental unit of input and extraction of the user’s voice signal against external interference influence are considered. As modern computer means, including mobile, have two-channel audio card, two microphones are used in the voice signal input. The distance between sonic-wave sensors is 20 mm and it provides forming one direction pattern lobe of microphone array in a desired area of voice signal registration (from 100 Hz to 8 kHz. According to the results of experimental studies, the usage of directional properties of the proposed microphone array and space-time processing of the recorded signals with implementation of constant and adaptive weighting factors has made it possible to reduce considerably the influence of interference signals. The results of firmware experimental studies for input and extraction of the user’s voice signal against external interference influence are shown. The proposed solutions will give the possibility to improve the value of the signal/noise ratio of the useful signals recorded up to 20 dB under the influence of external interference signals in the frequency range from 4 to 8 kHz. The results may be useful to specialists working in the field of voice recognition and speaker discrimination.
Abedin-Zadeh, R.; Thiele, R.; Wagner, W.; Whichello, J.
The increasing sophistication of non-destructive assay instruments, containment and surveillance devices and ancillary computer facilities used for safeguards purposes has resulted in a growing requirement for means to ensure the authenticity of information and thus preserve for the IAEA its capability to draw independent conclusions. The achievements of the last few years, particularly with regard to the development of new instruments, one of a kind instrumentation, conceptually new approaches such as the use of near-real-time accounting, and joint use arrangements, are largely the result of cooperation between the IAEA, state authorities, plant operators and certain national laboratories. It is anticipated that demands for various authentication features will further expand as growth in sophistication of equipment and automation of nuclear facilities continues, and that increasing reliance on in-line, unattended use instrumentation will become in future years the approach of choice. 8 refs, 1 fig., 1 tab
Jerusalin Carol .J
Full Text Available ABSTRACT The fingerprint, knuckle print and the retina are used to authenticate a person accurately because of the permanence in the features. These three biometric traits are fused for better security. The fingerprint and knuckle print images are pre-processed by morphological techniques and the features are extracted from the normalized image using gabor filter. The retinal image is converted to gray image and pre-processing is done using top hat and bottom hat filtering. Blood vessels are segmented and the features are extracted by locating the optic disk as the centre point. The extracted features from the fingerprint, knuckle print and the retina are fused together as one template and stored in the data base for authentication purpose, thus reducing the space and time complexity.
Full Text Available This paper describes different approaches for the face authentication from the features and classification abilities point of view. Authors compare two types of features - Histogram of Oriented Gradients (HOG and Local Binary Patterns (LBP including their combination. These parameters are classified using Multilayer Neural Network (MLNN and Support Vector Machines (SVM. Face authentication consists of several steps. The first step contains Viola-Jones algorithm for face detection. Authors resize the detected face for a fixed vector and afterwards, it is converted into grayscale. Next, feature extraction with a simple Min-Max normalization is applied. Obtained parameters are evaluated by classifiers and for each detected face, authors get posterior probability as the output of the classifier. Different approaches for face authentication are compared with each other using False Acceptance Rate (FAR, False Rejection Rate (FRR, Equal Error Rate (EER, Receiver Operating Characteristic (ROC and Detection Error Tradeoff (DET curves. The results are verified with AR Face Database and elaborated in a feature extraction and classifier design point of view. Best results were achieved by HOG feature for SVM classifier. Detailed results are listed in the text below.
Lee, Jasper C.; Ma, Kevin C.; Liu, Brent J.
A Data Grid for medical images has been developed at the Image Processing and Informatics Laboratory, USC to provide distribution and fault-tolerant storage of medical imaging studies across Internet2 and public domain. Although back-up policies and grid certificates guarantee privacy and authenticity of grid-access-points, there still lacks a method to guarantee the sensitive DICOM images have not been altered or corrupted during transmission across a public domain. This paper takes steps toward achieving full image transfer security within the Data Grid by utilizing DICOM image authentication and a HIPAA-compliant auditing system. The 3-D lossless digital signature embedding procedure involves a private 64 byte signature that is embedded into each original DICOM image volume, whereby on the receiving end the signature can to be extracted and verified following the DICOM transmission. This digital signature method has also been developed at the IPILab. The HIPAA-Compliant Auditing System (H-CAS) is required to monitor embedding and verification events, and allows monitoring of other grid activity as well. The H-CAS system federates the logs of transmission and authentication events at each grid-access-point and stores it into a HIPAA-compliant database. The auditing toolkit is installed at the local grid-access-point and utilizes Syslog , a client-server standard for log messaging over an IP network, to send messages to the H-CAS centralized database. By integrating digital image signatures and centralized logging capabilities, DICOM image integrity within the Medical Imaging and Informatics Data Grid can be monitored and guaranteed without loss to any image quality.
Cserháti, T.; Forgács, E.; Deyl, Zdeněk; Mikšík, Ivan
Roč. 19, č. 3 (2005), s. 183-190 ISSN 0269-3879 Grant - others:CZ-HU(CZ) Cooperation programme Institutional research plan: CEZ:AV0Z50110509 Keywords : chromatography * dairy products * vegetable oils Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 1.218, year: 2005
Ramírez Ortiz, Sandra Milena; Artunduaga Cuéllar, Marco Tulio
Attaining oral production is a challenge for most English language teachers because most of the strategies implemented in class do not engage students in speaking activities. Tasks are an optimal alternative to engage learners in communicative exchanges. This article presents the results of a qualitative action research study examining the effects…
Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system
De Bruyckere, Pedro; Kirschner, Paul A.
Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…
Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru
Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security
Wegner, K.; Branch, B. D.; Smith, S. C.
The Global Learning and Observations to Benefit the Environment (GLOBE) program is a worldwide hands-on, primary and secondary school-based science and education program (www.globe.gov). GLOBE's vision promotes and supports students, teachers and scientists to collaborate on inquiry-based authentic science investigations of the environment and the Earth system working in close partnership with NASA, NOAA and NSF Earth System Science Projects (ESSP's) in study and research about the dynamics of Earth's environment. GLOBE Partners conduct face-to-face Professional Development in more than 110 countries, providing authentic scientific research experience in five investigation areas: atmosphere, earth as a system, hydrology, land cover, and soil. This presentation will provide a sample for a new framework of Professional Development that was implemented in July 2013 at Purdue University lead by Mr. Steven Smith who has tested GLOBE training materials for future training. The presentation will demonstrate how institutions can provide educators authentic scientific research opportunities through various components, including: - Carrying out authentic research investigations - Learning how to enter their authentic research data into the GLOBE database and visualize it on the GLOBE website - Learn how to access to NASA's Earth System Science resources via GLOBE's new online 'e-Training Program' - Exploring the connections of their soil protocol measurements and the history of the soil in their area through iPad soils app - LIDAR data exposure, Hydrology data exposure
The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....
Kurz, Christina; Carle, Reinhold; Schieber, Andreas
Carotenoids including carotenoid esters from six apricot (Prunus armeniaca L.) cultivars and from eight cultivars from three pumpkin species (Cucurbita maxima Duch., Cucurbita pepo L., and Cucurbita moschata Duch.) were extracted without saponification, separated on a C-30 reversed-phase column and characterised by high-performance liquid chromatography/atmospheric pressure chemical ionisation-mass spectrometry (LC-MS). The predominant free carotenoids were quantified by HPLC with diode array detection. In contrast to previously published data, α-carotene could not be detected in apricots. Although the pumpkins showed significant differences in their free carotenoid profiles, major unesterified compounds different from those found in apricots could be determined. However, due to the natural heterogeneity, authentication of the apricot products cannot be accomplished exclusively using the profile of free carotenoids. Therefore, the investigations were extended to carotenoid esters. The xanthophyll ester profiles in pumpkins significantly differed from those in apricots in that the latter also contained both saturated and unsaturated fatty acids, whereas in pumpkins exclusively saturated fatty acids were detected. Admixtures of lower cost pumpkins could be detected in quantities of ⩾5% by increased contents of lutein and zeaxanthin, and by the appearance of antheraxanthin and α-carotene, respectively, depending on the added pumpkin cultivar, as well as the presence of characteristic lutein and antheraxanthin esters. However, pronounced differences in the carotenoid profiles of the investigated pumpkins and the partly minor amount of characteristic compounds lead to limitations of the detection of 5% level of admixture of pumpkin to apricot and of the method in general. Copyright © 2008 Elsevier Ltd. All rights reserved.
Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...
Lux, James Paul (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Haque, Salman-ul Mohammed (Inventor); Tkacenko, Andre (Inventor)
Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.
Buddhachat, Kittisak; Osathanunkul, Maslin; Madesis, Panagiotis; Chomdej, Siriwadee; Ongchai, Siriwan
The Phyllanthus genus, a plant used in traditional Thai medicine, has according to several pharmacopeias hepatoprotective properties. Not only is the anatomical morphology of these species relatively similar but they also share the Thai common names Look-Tai-Bai (ลูกใต้ใบ) and Yah-Tai-Bai (หญ้าใต้ใบ), which might cause confusion for laypersons. This study attempted to develop a method for accurate identification of Phyllanthus species, especially Phyllanthus amarus, and to detect contaminants in P. amarus products by using DNA barcoding coupled with high resolution melting (HRM) analysis (bar-HRM). Two plastid loci (rbcL and trnL) were chosen for DNA barcoding to generate a suitable primer for distinguishing Phyllanthus species by HRM analysis. The five species of Phyllanthus were subjected to amplification for testing the specificity and discrimination power of the designed primers derived from rbcL and trnL regions. Sensitivity of the method (DNA barcoding conjugated with HRM) to detect adulterant in P. amarus samples was evaluated. The commercial P. amarus products obtained from a local market were authenticated. The primer pair derived from trnL DNA barcoding (PhylltrnL) had more specificity and power of discrimination for Phyllanthus species than that derived from rbcL DNA barcoding (PhyllrbcL). The result showed that Tm of P. amarus, Phyllanthus urinaria, Phyllanthus debilis, Phyllanthus airy-shawii, and Phyllanthus virgatus was 74.3±0.08, 73.04±0.07, 73.36±0.05, 72.21±0.06, 72.77±0.15°C, respectively. This method proved to be a very sensitive tool that can be used for rapid detection of contamination as low as 1% of other Phyllanthus species in P. amarus admixtures. All commercial products of P. amarus obtained from a local market in Thailand were found to contain pure raw materials of P. amarus without any substitution or contamination. Our results indicated that the use of DNA barcoding coupled with HRM was an
Pitts, W. Karl
Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator's ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.
Shaffer, David Williamson; Resnick, Mitchel
Discusses authenticity as it is applied to educational interventions and argues that the concept should be analyzed more closely. Describes four kinds of authenticity; analyzes how computational media are well-suited to support different aspects of authentic learning; and discusses connectivity, modeling, and pluralism. Contains 75 references.…
Ahmed, Naveed; Jensen, Christian D.
Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session....... In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication...
Goncalves, Joao G.M.; Schwalbach, Peter; Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas
To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.
National Aeronautics and Space Administration — The Vegetable Production System (Veggie) was developed to be a simple, easily stowed, high growth volume, low resource facility capable of producing fresh vegetables...
Syntesa, Heiner Lehr
The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.
Major biometric methods used for identification and authentication purposes in modern computing systems are considered in the article. Basic classification, application areas and key differences are given.
Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.
Blair, Thomas Howard
Energy Production Systems Engineering presents IEEE, Electrical Apparatus Service Association (EASA), and International Electrotechnical Commission (IEC) standards of engineering systems and equipment in utility electric generation stations. Electrical engineers that practice in the energy industry must understand the specific characteristics of electrical and mechanical equipment commonly applied to energy production and conversion processes, including the mechanical and chemical processes involved, in order to design, operate and maintain electrical systems that support and enable these processes. To aid this understanding, Energy Production Systems Engineeringdescribes the equipment and systems found in various types of utility electric generation stations. This information is accompanied by examples and practice problems. It also addresses common issues of electrical safety that arise in electric generation stations.
Full Text Available Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA starting from Single-Factor Authentication (SFA and through Two-Factor Authentication (2FA. Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.
Ahmed, Naveed; Jensen, Christian D.
Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in the...
Das, Ashok Kumar
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
Blichfeldt, Henrik; Knudsen, Mette Præst
Alignment of market demand and manufacturing capabilities are directly linked to the potential competitive advantage. Pressure for manufacturing companies to customize increase the need for productions systems to handle innovations, especially in SMEs. The paper claims that innovativeness has...... a positive influence of the ability of the manufacturing system to provide specific capabilities that enables the entire production system to positively influence the competitiveness. A comparative case study of three SMEs shows that competitive advantages are obtained through innovative technologies......, but revealed also automation potential in data and information management to be more responsive and cost-effective....
Johnsen, Christian Garmann
As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...
Ahmed , Naveed; Jensen , Christian ,
Part 1: Full Papers; International audience; Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of a...
Tackney, Charles Thomas
Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study of employm......Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study...... of employment and work parameters in light of religious teachings on the social question at national, organizational, or firm-specific levels. The function of a criterion variable is described, noting that the switch from a dependent variable approach introduces an open-system dynamism to social science...
Mossoba, Magdi M; Azizian, Hormoz; Fardin-Kia, Ali Reza; Karunathilaka, Sanjeewa R; Kramer, John K G
Economically motivated adulteration (EMA) of extra virgin olive oils (EVOO) has been a worldwide problem and a concern for government regulators for a long time. The US Food and Drug Administration (FDA) is mandated to protect the US public against intentional adulteration of foods and has jurisdiction over deceptive label declarations. To detect EMA of olive oil and address food safety vulnerabilities, we used a previously developed rapid screening methodology to authenticate EVOO. For the first time, a recently developed FT-NIR spectroscopic methodology in conjunction with partial least squares analysis was applied to commercial products labeled EVOO purchased in College Park, MD, USA to rapidly predict whether they are authentic, potentially mixed with refined olive oil (RO) or other vegetable oil(s), or are of lower quality. Of the 88 commercial products labeled EVOO that were assessed according to published specified ranges, 33 (37.5%) satisfied the three published FT-NIR requirements identified for authentic EVOO products which included the purity test. This test was based on limits established for the contents of three potential adulterants, oils high in linoleic acid (OH-LNA), oils high in oleic acid (OH-OLA), palm olein (PO), and/or RO. The remaining 55 samples (62.5%) did not meet one or more of the criteria established for authentic EVOO. The breakdown of the 55 products was EVOO potentially mixed with OH-LNA (25.5%), OH-OLA (10.9%), PO (5.4%), RO (25.5%), or a combination of any of these four (32.7%). If assessments had been based strictly on whether the fatty acid composition was within the established ranges set by the International Olive Council (IOC), less than 10% would have been identified as non-EVOO. These findings are significant not only because they were consistent with previously published data based on the results of two sensory panels that were accredited by IOC but more importantly each measurement/analysis was accomplished in less than 5
Borodin, Mikhail; The ATLAS collaboration; De, Kaushik; Klimentov, Alexei; Golubkov, Dmitry; Maeno, Tadashi; Mashinistov, Ruslan; Wenaus, Torre; Padolski, Siarhei
The second generation of the ATLAS production system called ProdSys2 is a distributed workload manager which used by thousands of physicists to analyze the data remotely, with the volume of processed data is beyond the exabyte scale, across a more than hundred heterogeneous sites. It achieves high utilization by combining dynamic job definition based on many criterias, such as input and output size, memory requirements and CPU consumption with manageable scheduling policies and by supporting different kind of computational resources, such as GRID, clouds, supercomputers and volunteering computers. Besides jobs definition Production System also includes flexible web user interface, which implements user-friendly environment for main ATLAS workflows, e.g. simple way of combining different data flows, and real-time monitoring, optimised for using with huge amount of information to present. We present an overview of the ATLAS Production System major components: job and task definition, workflow manager web user i...
Li, Xueshu; Holland, Erika B; Feng, Wei; Zheng, Jing; Dong, Yao; Pessah, Isaac N; Duffel, Michael W; Robertson, Larry W; Lehmler, Hans-Joachim
Toxicological studies use "specialty chemicals" and, thus, should assess and report both identity and degree of purity (homogeneity) of the chemicals (or toxicants) under investigation to ensure that other scientists can replicate experimental results. Although detailed reporting criteria for the synthesis and characterization of organic compounds have been established by organic chemistry journals, such criteria are inconsistently applied to the chemicals used in toxicological studies. Biologically active trace impurities may lead to incorrect conclusions about the chemical entity responsible for a biological response, which in turn may confound risk assessment. Based on our experience with the synthesis of PCBs and their metabolites, we herein propose guidelines for the "authentication" of synthetic PCBs and, by extension, other organic toxicants, and provide a checklist for documenting the authentication of toxicants reported in the peer-reviewed literature. The objective is to expand guidelines proposed for different types of biomedical and preclinical studies to include a thorough authentication of specialty chemicals, such as PCBs and their derivatives, with the goal of ensuring transparent and open reporting of scientific results in toxicology and the environmental health sciences.
Ballantyne, J F
A new oil producing system is proposed which consists of a group of underwater wells, an underwater riser and a floating storage facility for the production of the wells. The group of wells and the riser are interconnected through a manifold system in such a way that the production from any well or from the entire group of wells go to the base (foundation) of the riser. From above the riser is connected with the floating storage facility which is equipped, besides tanks for storing the well products, with a separation device for separating the oil and the accompanying gas. The gas is used as a fuel for producing electric power required by the dynamic positioning systems. The products from each well are tested by means of a regulable coupling controlled by means of a cable, which is passed from the surface through the riser. The wellhead equipment for the unslanted wells is mounted on a template previously installed on the sea floor. From the template the well products enter the riser through the manifold unit system.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong
The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.
Christiansen, Thomas Bøhm
This paper presents the initial considerations related to a Ph.D. study initiated at IPV, DTU in February 1997, concerning the research subject "Development of Production Systems". The content and aim of this paper is to 1) to introduce the study by......This paper presents the initial considerations related to a Ph.D. study initiated at IPV, DTU in February 1997, concerning the research subject "Development of Production Systems". The content and aim of this paper is to 1) to introduce the study by...
Full Text Available Existing sustainable IT services have several problems related to user authentication such as the inefficiency of managing the system security, low security, and low usability. In this paper, we propose a Fast IDentity Online (FIDO authenticator that performs continuous authentication with implicit authentication based on user context and multimodal authentication. The proposed FIDO authenticator, a context-aware multimodal FIDO authentication (CAMFA method, combines information such as the user context, state of the mobile device, and user biometrics, then applies implicit and explicit authentication methods to meet the level of authentication required by the service provider. This reduces the user’s explicit authentication burden and continually authenticates users at risk during the session. Moreover, it is able to respond to attacks such as the theft of the authentication method or session hijacking. To study the effectiveness of CAMFA, we ran a user study by collecting data from 22 participants over 42 days of activity on a practical Android platform. The result of the user study demonstrates that the number of explicit authentication requests could be reduced by half. Based on the results of this study, an advanced user authentication that provides multimodal and continuous authentication could be applied to sustainable IT services.
Fang, Wanping; Meinhardt, Lyndel W; Mischke, Sue; Bellato, Cláudia M; Motilal, Lambert; Zhang, Dapeng
Cacao (Theobroma cacao L.), the source of cocoa, is an economically important tropical crop. One problem with the premium cacao market is contamination with off-types adulterating raw premium material. Accurate determination of the genetic identity of single cacao beans is essential for ensuring cocoa authentication. Using nanofluidic single nucleotide polymorphism (SNP) genotyping with 48 SNP markers, we generated SNP fingerprints for small quantities of DNA extracted from the seed coat of single cacao beans. On the basis of the SNP profiles, we identified an assumed adulterant variety, which was unambiguously distinguished from the authentic beans by multilocus matching. Assignment tests based on both Bayesian clustering analysis and allele frequency clearly separated all 30 authentic samples from the non-authentic samples. Distance-based principle coordinate analysis further supported these results. The nanofluidic SNP protocol, together with forensic statistical tools, is sufficiently robust to establish authentication and to verify gourmet cacao varieties. This method shows significant potential for practical application.
Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.
Both technical and economic factors affect the cost of producing hydrogen by photochemical processes. Technical factors include the efficiency and the capital and operating costs of the renewable hydrogen conversion system; economic factors include discount rates, economic life, credit for co-product oxygen, and the value of the energy produced. This paper presents technical and economic data for a system that generates on-peak electric power form photochemically produced hydrogen
May M Y Liang-Chu
Full Text Available Cell lines are the foundation for much of the fundamental research into the mechanisms underlying normal biologic processes and disease mechanisms. It is estimated that 15%-35% of human cell lines are misidentified or contaminated, resulting in a huge waste of resources and publication of false or misleading data. Here we evaluate a panel of 96 single-nucleotide polymorphism (SNP assays utilizing Fluidigm microfluidics technology for authentication and sex determination of human cell lines. The SNPtrace Panel was tested on 907 human cell lines. Pairwise comparison of these data show the SNPtrace Panel discriminated among identical, related and unrelated pairs of samples with a high degree of confidence, equivalent to short tandem repeat (STR profiling. We also compared annotated sex calls with those determined by the SNPtrace Panel, STR and Illumina SNP arrays, revealing a high number of male samples are identified as female due to loss of the Y chromosome. Finally we assessed the sensitivity of the SNPtrace Panel to detect intra-human cross-contamination, resulting in detection of as little as 2% contaminating cell population. In conclusion, this study has generated a database of SNP fingerprints for 907 cell lines used in biomedical research and provides a reliable, fast, and economic alternative to STR profiling which can be applied to any human cell line or tissue sample.
Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian
The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.
Starting from elementary considerations about independence and Markov processes in classical probability we arrive at the new concept of conditional monotone independence (or operator-valued monotone independence). With the help of product systems of Hilbert modules we show that monotone conditional independence arises naturally in dilation theory.
He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang
We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.
Garmann Johnsen, Christian
In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...
Saevanee , Hataichanok; Clarke , Nathan ,; Furnell , Steven ,
Part 12: Authentication and Delegation; International audience; The potential advantages of behavioural biometrics are that they can be utilised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authentication systems is create a multi-modal behavioural biometric authentication system. This research investigated three behavi...
Maitra, Tanmoy; Giri, Debasis
The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.
Goffee, Rob; Jones, Gareth
Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.
Groshev, A. M.; Groshev, S. M.; Tumasov, A. V.; Romanov, A. D.
This paper presents the development of the carriageway actual parameters determination system to form a virtual road scene in the authentically recognizable road marking absence and negative obstacles presence. The sensors used in defining the vehicle position and the obstacles are given. The developed system will be able to function independently and also work collaboratively with the other ADAS functions increasing the functional quality of the system.
Zhang, Haisu; Tzortzakis, Stelios
We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.
Zhang, Haisu [Institute of Electronic Structure and Laser, Foundation for Research and Technology Hellas, Heraklion 71110 (Greece); Tzortzakis, Stelios, E-mail: firstname.lastname@example.org [Institute of Electronic Structure and Laser, Foundation for Research and Technology Hellas, Heraklion 71110 (Greece); Materials Science and Technology Department, University of Crete, 71003 Heraklion (Greece); Science Program, Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar)
We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.
Wu, Zhen-Yu; Tseng, Yi-Ju; Chung, Yufang; Chen, Yee-Chun; Lai, Feipei
With the rapid development of the Internet, both digitization and electronic orientation are required on various applications in the daily life. For hospital-acquired infection control, a Web-based Hospital-acquired Infection Surveillance System was implemented. Clinical data from different hospitals and systems were collected and analyzed. The hospital-acquired infection screening rules in this system utilized this information to detect different patterns of defined hospital-acquired infection. Moreover, these data were integrated into the user interface of a signal entry point to assist physicians and healthcare providers in making decisions. Based on Service-Oriented Architecture, web-service techniques which were suitable for integrating heterogeneous platforms, protocols, and applications, were used. In summary, this system simplifies the workflow of hospital infection control and improves the healthcare quality. However, it is probable for attackers to intercept the process of data transmission or access to the user interface. To tackle the illegal access and to prevent the information from being stolen during transmission over the insecure Internet, a password-based user authentication scheme is proposed for information integrity.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao
Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.
Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. ...
: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The stud...
Ahmad Mosa Batianeh
Full Text Available Abstractــ-This study explored the effects of using online chat and word processors on students' writing skills that include; organizing a text, spelling, punctuation, grammar, phrasal verbs, idioms, idiomatic expressions, pragmatics, creativity, vocabulary growth, content, relational words, conjunctions, authenticity, figures of speech, imagination, coherence, style, socio-cultural aspects, language use, and the production of authentic text. The study group consisted of students in the Department of Languages and Translation at Taibah University who registered for the Writing Two course in the first semester of the 2012 - 2013 academic year. Fourty subjects were divided into two sections: section one was assigned as an experimental group (supported by Facebook and Skype and section two was assigned as a control group and was asked to write their essays with paper and pencil. Facebook and Skype accounts were created for every student in the experimental group. Data was analyzed from pre-test and post-test results to evaluate the question posed by the study: Does the use of online text chat assisted with word processors help undergraduate students develop their writing skills more than traditional methods of teaching? The results revealed that students who worked with Facebook and Skype showed a significant improvement in their writing skills when compared to the control group. In light of these findings, it is recommended that online discussions via Facebook, Skype, and other social media sites should be utilized when teaching writing and the other language skills.
Full Text Available The main objective of this article is to point a set of practical strategies that can be adopted to increase the capacity of constraints resources on production systems, when the constraint is inside the factory and not is in the market. To serve this purpose will be presented strategies based on best practices of the Theory of Constraints, Lean Manufacturing and Total Productive Maintenance. This article also presents the mains tools for the deployment of these methodologies. The survey results have provided an objective set of practical strategy that can be used to increase the capacity and productivity of production systems according to the needs of each manufacturing system.
Boorla, Srinivasa Murthy; Howard, Thomas J.
study is used to demonstrate how the monitoring system can be used to efficiently guide corrective action to improve product performance. It is claimed that the monitoring system can be used to dramatically cut the time taken to identify, planand execute corrective action related to typical quality......In the current quality paradigm, the performance of a product is kept within specification by ensuring that its parts are within specification. Product performance is then validated after final assembly. However, this does not control how robust the product performance is, i.e. how much...... it will vary between the specification limits. In this paper, a model for predicting product performance is proposed, taking into account design, assembly and process parameters live from production. This empowers production to maintain final product performance, instead of part quality. The PRECI‐IN case...
Seema Mehla; Bhawna Gupta
the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...
McAloone, Timothy Charles; Andreasen, Mogens Myrup
, company and society benefit from the service systems related to each one of these dimensions, rather than simply one of the above. There are existing examples of the enhancement of business and market share by focusing on PSS, but this is often not a result of upfront strategy and ambitious goals. We...... attempt to identify the nature of such a multiple definition of PSS, the link to proper understanding of value and utility and innovative approaches for PSS-oriented product development. This paper will expand on the phenomenon of PSS in the belief that a proper understanding of PSS will give us...
Thron, Jonathan Louis [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; White, Greg [LLNL; Razinkov, Sergey [VNIIEF; Livke, Alexander [VNIIEF
Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.
U.S. Environmental Protection Agency — The Pesticide Product Information System contains information concerning all pesticide products registered in the United States. It includes registrant name and...
Hamlet, Jason R; Pierson, Lyndon G
Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.
Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work
Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.
Lee, Wei-Han; Lee, Ruby B.
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the...
Full Text Available Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The study involved 62 superintendants who were formerly principals of secondary schools, high schools, and vocational schools in Bandung, West Java. The results show that authentic leadership was a suitable type of leadership model to effectively instill value system. It also demonstrated that authentic leadership was a unidimensional construct. Abstrak: Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai. Penelitian ini bertujuan untuk menguji seberapa penting authentic leadership untuk dijadikan sebagai alternatif kepemimpinan di sekolah untuk menanamkan sistem nilai dan karakter warga sekolah serta menguji multidimensionalitas konstruk authentic leadership di sekolah. Metode Delphi Survey digunakan untuk pengujian tingkat pentingnya perilaku authentic leadership dengan partisipan 62 pengawas mantan kepala sekolah SMP, SMA dan SMK di Kota Bandung. Hasil penelitian menunjukan bahwa authentic leadership adalah tipe kepemimpinan yang tepat untuk menanamkan sistem nilai secara efektif. Penelitian juga membuktikan bahwa authentic leadership merupakan konstruk yang bersifat unidimensional.
Full Text Available The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
Saito, Shoichi; Uehara, Tetsutaro; Izumi, Yutaka; Kunieda, Yoshitoshi
The VPN (Virtual Private Network) technique becomes more and more popular to protect contents of messages and to achieve secure communication from incidents, such as tapping. However, it grow in usage that a VPN server is used on a sub-network in part of an office-wide network. But, a PPTP system included in Windows operating systems cannot establish nested VPN links. Moreover encrypted communication by VPN hides a user of the VPN connection. Consequently, any administrators of network systems can’t find out the users of the VPN connection via firewall, moreover can’t decide whether if the user is legal or not. In order to solve this problem, we developed a multi step PPTP relay system on a firewall. This system solves all the problems of our previously developed PPTP relay system(1). The new relay system improves security by encrypting through the whole end-to-end communication and abolishing of prior registration of passwords for the next step. Furthermore, transport speed is accelerated, and the restriction of the number of steps on relay is also abolished. By these features the multi step PPTP relay system expands usability.
Papatsimpa, Charikleia; Linnartz, Jean-Paul; de Groot, Joep; Skoric, B.; Ignatenko, T.
Helper data systems mitigate the risk that biometric templates are stolen from a biometric data base. Yet, current systems face the drawback that strong Error Correction is needed in order to mitigate variations in the measured biometric during verification. Error correction codes are not always
Craft, R.L.; Draelos, T.J.
The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations
Lia M. S. de Ferrante
Full Text Available Baccharis trimera (carqueja is a medicinal plant used for stomach pain, bad digestion, heart bum, kidney problems and constipation. The objective of the present work was a quality study of carqueja commercialized in Curitiba and metropolitan region (Paraná-Brazil using gas chromatography techniques (GC/FID for analyses of the essential oil, which was extracted through hydrodistillation using a Clevenger system. Macro and microscopic analyses were also done. Some samples were contaminated by other species of plants, fungi and small insects, some of them could be identified. Among all samples, 21 showed similar chromatographic profile to the standard oil, and 7 had different profile in relation to the standard. The chromatogram analyses showed that most of the analyzed samples had the similar profile as the standard oil of Baccharis trimera. GC/FID-based authentication of Baccharis trimera may be useful as a rapid tool to ensure quality control and safety monitoring of this kind of herbal pharmaceuticals.
In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry.
Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C
Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
"Seeing" the Difference: The Importance of Visibility and Action as a Mark of "Authenticity" in Co-production Comment on "Collaboration and Co-production of Knowledge in Healthcare: Opportunities and Challenges".
Cooke, Jo; Langley, Joe; Wolstenholme, Dan; Hampshaw, Susan
The Rycroft-Malone paper states that co-production relies on 'authentic' collaboration as a context for action. Our commentary supports and extends this assertion. We suggest that 'authentic' co-production involves processes where participants can 'see' the difference that they have made within the project and beyond. We provide examples including: the use of design in health projects which seek to address power issues and make contributions visible through iteration and prototyping; and the development of 'actionable outputs' from research that are the physical embodiment of co-production. Finally, we highlight the elements of the Collaboration for Leadership in Applied Health Research and Care (CLAHRC) architecture that enables the inclusion of such collaborative techniques that demonstrate visible co-production. We reinforce the notion that maintaining collaboration requires time, flexible resources, blurring of knowledge producer-user boundaries, and leaders who promote epistemological tolerance and methodological exploration. © 2017 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Buhan, I.R.; Bazen, A.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.
For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the 'standard' architecture of a biometric system is extended by adding components like crypto,
This thesis describes developmental research, aiming at a useful approach for modern secondary ecology education. The research question is: What are the characteristics of a valid, feasible and effective learning and teaching strategy about ecosystem behaviour using modelling and systems thinking in
Nair, Kishor Krishnan
Full Text Available -on-Card (TOC), Match-on- Card (MOC), Work-Sharing On-Card (WSOC), and System-on-Card (SOC). Out of these four approaches, the SOC is considered as the most secure and expensive, whereas the TOC is considered as the least secure and least expensive. The MOC...
Nair, Kishor Krishnan
Full Text Available -on-Card (TOC), Match-on-Card (MOC), Work-Sharing On-Card (WSOC), and System-on-Card (SOC). Out of these four approaches, the SOC is considered as the most secure and expensive, whereas the TOC is considered as the least secure and least expensive. The MOC...
Buhan, I.R.; Bazen, A.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Zhang, David; Jain, Anil K.
For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the standard architecture of a biometric system is extended by adding components like crypto, audit
Lai, Lifeng; Gamal, Hesham El; Poor, H. Vincent
In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios,...
Cohen, E; Cohen, SA
Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, “cool” and “hot”. Through a range of examples, we demonstrate the implications of the two modes for the dynamics of the constitution of tourist attr...
Evans, Jane A.; Pashley, Vanessa [NIGL, BGS, Keyworth, NG12 5GG (United Kingdom); Richards, Gemma J. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom); Brereton, Nicola [The Food and Environment Research Agency, Sand Hutton, York YO41 1LZ (United Kingdom); Knowles, Toby G. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom)
This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. - Highlights: • Lead (Pb) isotopes measured in modern British meat were geogenic in origin. • The match indicates that this technique may be used to provenance biological products. • There was no evidence for a contribution from modern anthropogenic Pb sources.
Evans, Jane A.; Pashley, Vanessa; Richards, Gemma J.; Brereton, Nicola; Knowles, Toby G.
This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. - Highlights: • Lead (Pb) isotopes measured in modern British meat were geogenic in origin. • The match indicates that this technique may be used to provenance biological products. • There was no evidence for a contribution from modern anthropogenic Pb sources.
Evans, Jane A; Pashley, Vanessa; Richards, Gemma J; Brereton, Nicola; Knowles, Toby G
This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. Copyright © 2015. Published by Elsevier B.V.
Miller, Thomas Dedenroth
This report describes attributes of models and systems, and how models can be used for description of production systems. There are special attention on the 'Theory of Domains'.......This report describes attributes of models and systems, and how models can be used for description of production systems. There are special attention on the 'Theory of Domains'....
Jaykar Priyanka; More Sharada; Thube Swapnil; Prof. Supriya Dinesh
According to 2011 census there are decline in both rural and urban area of the country.This sex ratio decline in rural India is three times as compared to drop in urban area. A matter is great concern. In 2011 there is 914 girls for every 1000 boys under the age of seven , so that to stop sex selective abortion we have to developed ‘Cloud Computing solution for Abortion tracking system ’.When pregnant women comes to hospital she has to register using Fingerprint and RFID which is connected to...
Pedraza-Acosta, Isabel; Pilkington, Alan; Barnes, David
strategic stamping suppliers. Findings: Our contribution is the multi-phased production and product innovation process. This is an advance from traditional supplier selection and also an extension of ideas of supplier-located product development as it includes production system development, and complements...
Full Text Available This paper focuses on the urge of young people to find a purpose in their lives and make them more meaningful by insisting on the uniqueness of every individual. It is based on the analysis of two films: Professor Kosta Vujić’s Hat (directed by Zdravko Šotra, 2012; based on the novel by MilovanVitezović and Dead Poets Society (by Peter Weir, 1989. This journey is made through resisting and fighting against rigid rules of the educational system. The metamorphosis is influenced by two extraordinary teachers who give their students motivation and support. We will also consider the role of a teacher in the modern society and the possibility to switch from an ordinary lecturer to an exceptional leader, who encourages these students to look at life from different perspectives by making them question common thinking patterns.
Verma, Gaurav; Sinha, Aloka
A nonlinear image encryption scheme using phase-truncated Fourier transform (PTFT) and natural logarithms is proposed in this paper. With the help of the PTFT, the input image is truncated into phase and amplitude parts at the Fourier plane. The phase-only information is kept as the secret key for the decryption, and the amplitude distribution is modulated by adding an undercover amplitude random mask in the encryption process. Furthermore, the encrypted data is kept hidden inside the face biometric-based phase mask key using the base changing rule of logarithms for secure transmission. This phase mask is generated through principal component analysis. Numerical experiments show the feasibility and the validity of the proposed nonlinear scheme. The performance of the proposed scheme has been studied against the brute force attacks and the amplitude-phase retrieval attack. Simulation results are presented to illustrate the enhanced system performance with desired advantages in comparison to the linear cryptosystem.
Kent, Alexander Dale [Los Alamos, NM
Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.
Henderson, N.J.; White, N.M.; Veldhuis, Raymond N.J.; Hartel, Pieter H.; Slump, Cornelis H.
The use of signals resulting from tapping a rhythm on a pressure sensor is explored for authentication. The features used for authentication can be divided into rhythm and waveform features. This paper studies the use of waveform features. A verification scheme based on prototype waveforms is
van den Bosch, Ralph
Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show
We revisit the notion of a product of a normal subsystem with a p-subgroup as defined by Aschbacher (2011) [Asc11, Chapter 8]. In particular, we give a previously unknown, more transparent construction....
National Oceanic and Atmospheric Administration, Department of Commerce — Collection of annual data on processed seafood products. The Division provides authoritative advice, coordination and guidance on matters related to the collection,...
Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.
Zhang, Fan; Xu, Lei
The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.
Cooke, Jo; Langley, Joe; Wolstenholme, Dan; Hampshaw, Susan
The Rycroft-Malone paper states that co-production relies on ‘authentic’ collaboration as a context for action. Our commentary supports and extends this assertion. We suggest that ‘authentic’ co-production involves processes where participants can ‘see’ the difference that they have made within the project and beyond. We provide examples including: the use of design in health projects which seek to address power issues and make contributions visible through iteration and prototyping; and the development of ‘actionable outputs’ from research that are the physical embodiment of co-production. Finally, we highlight the elements of the Collaboration for Leadership in Applied Health Research and Care (CLAHRC) architecture that enables the inclusion of such collaborative techniques that demonstrate visible co-production. We reinforce the notion that maintaining collaboration requires time, flexible resources, blurring of knowledge producer-user boundaries, and leaders who promote epistemological tolerance and methodological exploration. PMID:28812827
Aksenova, V. I.; Belov, V. I.
The development of a complex of tasks for the operational management of production (OUP) within the framework of an automated system for production management (ASUP) shows that it is impossible to have effective computations without reliable initial information. The influence of many factors involving the production and economic activity of the entire enterprise upon the plan and course of production are considered. It is suggested that an adequate model should be available which covers all levels of the hierarchical system: workplace, section (bridgade), shop, enterprise, and the model should be incorporated into the technological sequence of performance and there should be provisions for an adequate man machine system.
Full Text Available The most significant transformations that globalization produces occur in production. Since the '60s, a new division of labor has made its presence felt in the world, arising from the "de-industrialization" of the developed and transfer production capacity of resource-intensive industries and pollutants from these countries to the developing world. "Dislocation" industry had the interim foreign direct investment made in the new industrialized countries, the latter becoming, in turn, sources of direct foreign investment, taking its capital in other countries in developing handsets. Currently, FDI destination is no longer a priority in developing countries, yet they are increasingly leaning towards the developed countries, due to the attractiveness offered by their economies.
Herrero, Beatriz; Lago, Fátima C; Vieites, Juan M; Espiñeira, Montserrat
Judged by quality and taste, the European sole (Solea solea) is considered one of the finest flatfish and is, thus, of considerable commercial value. In the present work, a specific fast real-time PCR was developed for the authentication of S. solea, i.e. to distinguish it from other related species and avoid substitution of this species, either deliberately or unintentionally. The method is based on a species-specific set of primers and MGB Taqman probe which amplifies a 116-bp fragment of the internal transcribed spacer 1 (ITS 1) ribosomal DNA region. This assay combines the high specificity and sensitivity of real-time PCR with the rapidity of the fast mode, allowing the detection of S. solea in a short period of time. The present methodology was validated for application to all types of manufactured products for the presence of S. solea, with successful results. Subsequently, the method was applied to 40 commercial samples to determine whether correct labeling had been employed in the market. It was demonstrated that the assay is a useful tool in monitoring and verifying food labeling regulations.
George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana
The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.
Degenhardt, M. A. B.
Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…
A. V. Tokarev
Full Text Available The problem of management of production target in technological system of production of sausages of the set quality is considered in article. Decomposition of technological system is considered. Functions of management are allocated: formation of an optimum compounding of forcemeat, expert analysis of a compounding, laboratory analysis of a compounding and its statement. Information technology of interaction of these functions is offered. The mathematical problem definition of finding of an optimum compounding meat product with use of possible substitutes of ingredients is presented. This mathematical problem is a classical linear programming problem whose solution has the standard program. Since the manufacture of the finished product are various nonlinear effects are taken into account at the present time it is practically impossible, the methodology provided in this operation "Expert analysis of the formulation" and "Laboratory analysis of the finished product." An example of calculating the optimum alternative base recipe "Sausages “Viennese with cheese”" TS 9213-010-40155161-2002. For an alternative formulation demands were made at a cost of meat, the ingredient composition, as well as the final product organoleptic and physic-chemical indicators should comply with regulatory requirements "Sausages “Viennese with cheese”" TS 9213-010-40155161-2002. Indicator acid activity (pH calculated stuffing formulation should be in the range 6.0-6.3. As a partial replacement for the main raw material have been proposed acceptable substitutes. It was necessary to calculate on the basis of the formulation "Sausages “Viennese with cheese”" TS 9213-010-40155161-2002 optimal price and quality alternative formulation. As a result of depreciation of the value of alternative stuffing recipe was 14,5 % when all of the restrictions on the consumer properties. The proposed information technology implemented in the software package "Multi
The invention refers to the field of air conditioning and regards an apparatus for obtaining cooled water . The purpose of the invention is to develop...such a system for obtaining cooled water which would permit the maximum use of the cooling effect of the water -cooling tower.
Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
Djurdja Solesa-Grijak; Dragan Solesa; Nedjo Kojic
To know yourself and to act accordingly has been seen as a moral imperative throughout history. The aim of this research was to determine potential of students for authentic leadership and relation between their authentic personality and potential for authentic leadership. The sample consisted of students (N=133) from Serbia (male – 59% and female – 41%). The average age of students was M=21.9. Instruments used were Authenticity Scale (Wood et al., 2008) and Authentic Leadership Self-Assessme...
The design discipline has traditionally focused on products physical aspects, giving for granted that the context of services, infrastructures and technology will support the product life. A systemic perspective would revise such a focus, in order to project design competences over systemic...... aspects usually neglected by designers. This perspective shift is a challenge for designers, who have very efficient methods and tools to handle physical aspects of product design, but need to define an ?operative paradigm? to operate in a systemic context. An operative paradigm consists of a set of tools...... and methods to handle immaterial aspects such as time sequences, actors? role and logical links in a product service system (PSS). Tools and methods can be borrowed from other disciplinary contexts, their relevance, though, derives from their adaptation to this specific study area: designing in a systemic...
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
Beauchemin, M.; Klasa, M.; Fortier, S.; Fortin, F.; Hardy, G.; Pelletier, L.; Edouard, S.; Archambault, B.; Yazidi, H.
The Canadian Meteorological Centre (CMC) delivers a large number of numerical weather prediction products to the various weather offices and clients throughout Canada and abroad. The current post production system was built according to the needs and ideology of the 1980's and it is becoming obsolete with time. Its cumbersome architecture is difficult to maintain and requires a lot of human and computing resources. The "Weather Elements" section of CMC is aware of the problems associated with its maintenance in the long term and has therefore decided to review in depth the whole approach to the operational post production. The analysis of present and future needs have led to the development of an innovative concept in the operational production field inspired by the "Plug and Play" process. SPOOKI (Système de Production Orienté-Objet contennant une Kyrielle d'Informations - Object oriented production system containing a myriad of information) was created in its present form in 2007. It is based on a modular approach where each plug-in component is specialized, reusable and autonomous. These object oriented programming characteristics greatly simplify the maintenance of the system. Particular attention was also given to create a user-friendly system for novice users. An experimental version of SPOOKI is currently running in development mode and an operational one is planned to be implemented in the coming year. The poster presentation will describe SPOOKI, the future CMC operational post production system. Several examples of usage will be shown.
Jenkins, Rob; McLachlan, Jane L; Renaud, Karen
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
Huang, Jingyu; Nkrumah, Philip N; Appiah-Sefah, Gloria; Tang, Shijiang
L-leucine products among other branched chain amino acid supplements are highly susceptible to economically motivated adulteration. Curbing this menace is critical and timely. Hence, the δ(15) N composition of the L-leucine derived from plants and animals sources was estimated. The trophic enrichment phenomenon of δ(15) N composition was utilized to elucidate the sources. We finally established the distinction between the respective sources. Samples of plant sources (maize and soybean) and that of animal sources (pig fur and duck feather) were analyzed for δ(15) N isotopic signatures. An elemental analyzer which was connected to an isotope ratio mass spectrometer operated in the continuous flow mode was utilized. The raw materials were obtained from China. Statistical analysis was performed using descriptive statistics and one-way analysis of variance. The results indicated lower δ(15) N values of range -0.7344‰ to 2.384‰ and 1.032‰ to 2.064‰ for maize and soybean samples, respectively. Whereas, a range of 3.860‰ to 6.011‰ and 5.875‰ to 6.011‰ was, respectively, detected in pig fur and duck feather samples. The δ(15) N difference in plants and animals samples was significant (F = 165.0; P = 1.675 E-10 for maize and pig fur samples; F = 212.8; P = 0.0001284 for soybean and duck feather samples). It was observed that δ(15) N trophic enrichment is helpful in elucidating the respective sources. The authors can emphatically assert that the range of δ(15) N composition of L-leucine derived from plants sources within the study area is -1.000‰ to 3.000‰ whereas the range in animal sources is 4.000‰ to 9.000‰. Practical Application This study provides a reliable approach in verifying the authenticity of not only L-leucine products but also other branched chain amino acid supplements and thereby would help in fraud detection of any economically motivated adulteration and mislabeling of these products. When coupled with H and O stable
Das, Ashok Kumar; Bruhadeshwar, Bezawada
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
The design discipline has traditionally focused on products’ physical aspects, giving for granted that the context of services, infrastructures and technology will support the product life. A systemic perspective would revise such a focus, in order to project design competences over systemic...... aspects usually neglected by designers. This perspective shift is a challenge for designers, who have very efficient methods and tools to handle physical aspects of product design, but need to define an ‘operative paradigm’ to operate in a systemic context. An operative paradigm consists of a set of tools...... and methods to handle immaterial aspects such as time sequences, actors’ role and logical links in a product service system (PSS). Tools and methods can be borrowed from other disciplinary contexts, their relevance, though, derives from their adaptation to this specific study area: designing in a systemic...
Duan, Bao-Zhong; Wang, Ya-Ping; Fang, Hai-Lan; Xiong, Chao; Li, Xi-Wen; Wang, Ping; Chen, Shi-Lin
Rhizoma Paridis (Chonglou) is a commonly used and precious traditional Chinese medicine. Paris polyphylla Smith var. yunnanensis (Franch.) Hand. -Mazz. and Paris polyphylla Smith var . chinensis (Franch.) Hara are the two main sources of Chonglou under the monograph of Rhizoma Paridis in Chinese Pharmacopoeia. In the local marketplace, however, this medicine is prone to be accidentally contaminated, deliberately substituted or admixed with other species that are similar to Rhizoma Paridis in shape and color. Consequently, these adulterations might compromise quality control and result in considerable health concerns for consumers. This study aims to develop a rapid and sensitive method for accurate identification of Rhizoma Paridis and its common adulterants. DNA barcoding coupled with high resolution melting analysis was applied in this research to distinguish Rhizoma Paridis from its adulteration. The internal transcribed spacer 2 (ITS2) barcode was selected for HRM analysis to produce standard melting profile of the selected species. DNA of the tested herbal medicines was isolated and their melting profiles were generated and compared with the standard melting profile of P. polyphylla var. chinensis . The results indicate that the ITS2 molecular regions coupled with HRM analysis can effectively differentiate nine herbal species, including two authentic origins of Chonglou and their seven common adulterants. Ten herbal medicines labeled "Chonglou" obtained from a local market were collected and identified with our methods, and their sequence information was analyzed to validate the accuracy of HRM analysis. DNA barcoding coupled with HRM analysis is a accurate, reliable, rapid, cost-effective and robust tool, which could contribute to the quality control of Rhizoma Paridis in the supply chain of the natural health product industry (NHP).
Craig Wiles; Gail Vander Stoep
A review of heritage tourism literature reveals a fundamental tension over the use, function, and degree of authenticity of historic resources used for tourism development. Using a case study approach, this paper explores how stakeholder beliefs regarding historical authenticity influence the heritage tourism products, services, and experiences created for visitors and...
the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new......How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...
D. A. Sokolov
Full Text Available The article considers the possibility of using biometric authentication methods for mobile devices. The implementation of keystroke dynamics-based authentication system is presented. Testing process and results are described.
Nadia M. G. Al-Saidi
Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.
Erasmus, Sara W; Muller, Magdalena; Hoffman, Louwrens C
Authentic meat products are gaining attention through their unique quality characteristics linked to their origin. Various factors are known to influence the quality of fresh meat. This review describes the different Protected Designation of Origin (PDO) and Protected Geographical Indication (PGI) lamb types and discusses the factors which influences its unique sensory and chemical characteristics. Flavour, aroma, texture and colour play an integral part in the sensory quality of denomination of origin fresh meat products. For authentic fresh sheep meat the sensory (as well as chemical) quality is largely influenced by diet followed by breed, age and gender. However, diet forms the link with the geographical area of origin, which together with the traditional production system and sheep breeds used, lends the product its authentic nature. This review shows how diet linked to origin can affect the quality of the meat and furthermore how other factors such as breed can also have an effect. Research relating to the authentic lamb types were evaluated and the shortcomings highlighted in order to assist with the development of PDO and PGI specifications in the future. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.
Full Text Available Authentic leadership is the latest evolutionary stage in leadership development and emphasizes the leader's authenticity. The construct of authenticity was researched by ancient Greek philosophers as 'know thy-self ', and 'thy true self '. Authentic leadership began to develop after 2004. The main reason why the researchers place so much attention to authentic leadership is fact that authentic leadership reaches all of the employees in organizations. Authentic leaders must identify the strengths of their followers and help them with their development and integration towards a common goal, purpose, vision and identity of the organization. Authentic leadership is seen as the final stage in the development of leadership styles, properties of this leadership style, and the consequences of this style have not been fully explored. In our paper we will explore this new style of leadership and its implications.
During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.
Hydrogen is closely watched for environmental issues in recent years. In this research, hydrogen production systems and production techniques are widely investigated, and selected some hydrogen production process which have high validity for FBR system. Conclusions of the investigation are shown below. (1) Water-electrolysis processes and steam reform processes at low temperatures are already realized in other fields, so they well be easily adopted for FBR system. FBR system has no advantage when compared with other systems, because water-electrolysis processes can be adopted for other electricity generation system. On the other hand, FBR system has an advantage when steam reforming processes at low temperatures will be adopted, because steam reforming processes at 550-600degC can't be adopted for LWR. (2) Thermochemical processes will be able to adopted for FBR when process temperature will be lowered and material problems solved, because their efficiencies are expected high. Radiolysis processes which use ray (for example, gamma rya) emitted in reactor can be generate hydrogen easily, so they will be able to be adopted for FBR if splitting efficiency will be higher. Further investigation and R and D to realize these processes are considered necessary. (author)
Borodin, Mikhail; The ATLAS collaboration
The second generation of the ATLAS Production System called ProdSys2 is a distributed workload manager that runs daily hundreds of thousands of jobs, from dozens of different ATLAS-specific workflows, across more than a hundred heterogeneous sites. It achieves high utilization by combining dynamic job definition based upon many criteria, such as input and output size, memory requirements and CPU consumption, with manageable scheduling policies and by supporting different kinds of computational resources, such as GRID, clouds, supercomputers and volunteer computers. The system dynamically assigns a group of jobs (task) to a group of geographically distributed computing resources. Dynamic assignment and resource utilization is one of the major features of the system. The Production System has a sophisticated job fault recovery mechanism, which efficiently allows running multi-terabyte tasks without human intervention. We have implemented new features which allow automatic task submission and chaining of differe...
Kocabas, U.; Peter, Andreas; Katzenbeisser, S.; Sadeghi, A.
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich
Wandsvik, Atle; Zare, Mehdi
E-business is a new trend in Internet use. Authentic travel is an approach to travel and travel business which helps the traveler experience what is authentic in the travel destination. But how can the traveler find those small authentic spots and organize them together to compose a vacation? E-business techniques, combined withTopic Maps, can help.
Fiscal 1998 achievement report on regional consortium research and development project. Venture business raising type regional consortium - Small business creation base type (Research and development of cooperative/distributed user authentication system conforming to HTTP); 1998 nendo HTTP purotokoru de jitsugensuru kyocho bunsan user ninsho system no kenkyu kaihatsu seika hokokusho
Since electronic commerce is rapidly expanding while an increasing number of corporations are in operation on digital networks, importance is also growing of systems for user identification and authentication. The aim is to develop a user authentication system, low in price and easy to introduce, which is needed by the Internet on which there is a growing world-wide market and by Intranets. A cooperative/distributed user authentication system has been developed, under which a user who has registered his passport with a server can access plural servers using one and the same password while enjoying high security. It is an HTTP (hypertext transfer protocol)-conforming application program under which user information distributed among plural servers works cooperatively to present a convenient, safe, fault-free user authentication system. A survey is conducted for its commercialization, and the magnitude of the market that requires this technology, the importance of this technology, etc., are clarified. (NEDO)
PROF. OLIVER OSUAGWA
Dec 1, 2014 ... securing and protecting our identity and valuable data have become areas of great concern ... authentication, verification, tracking and identification systems. It helps to ... managing access while protecting both the ..... Microsoft Operating System XP/Vista, ... range support of fingerprint readers and template.
Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work
Chavez, Monika M. Th.
A survey investigated the attitudes of second language learners about authentic texts, written and oral, used for language instruction. Respondents were 186 randomly-selected university students of German. The students were administered a 212-item questionnaire (the items are appended) that requested information concerning student demographic…
Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.
A "Model of Authentic Becoming" that conceptualizes learning as a continuous and ongoing embodied and relational process, and uses social constructionism assumptions as well as Kolb's experiential learning model as its point of departure, is presented. Through a focus on the subjective, embodied, and relational nature of organizational life, the…
Tackney, Charles Thomas
This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...
Full Text Available While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1 consumer value ratings, (2 willingness to pay, and (3 behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1 archival data from voluntary consumer evaluations of restaurants in an online review system, (2 a university-based behavioral lab experiment, and (3 an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.
Grubbs, Robert K.; Romero, Juan A.
The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.
Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.
Full Text Available This paper deals with the productivity of the logistic production system. The aim is to define the intermediate state of the production machines and equipment (OOE, identification of the material flows, idle time and breakdown forecasting, with the following purchase of the required spare parts. The goal of the system is the satisfaction of the customer´s needs and the minimalisation of not fulfilling the required terms for delivery with simultaneous increasing of the logistic production system productivity.
Johnson, J.R.; Akabani, G.
This paper describes our effort to develop a metric for radiation exposure that is more fundamental than adsorbed dose and upon which a metric for exposure to chemicals could be based. This metric is based on the production of radicals by the two agents. Radicals produced by radiation in biological systems commonly assumed to be the same as those produced in water despite the presence of a variety of complex molecules. This may explain why the extensive efforts to describe the relationship between energy deposition (track structure) and molecular damage to DNA, based on the spectrum of radicals produced, have not been successful in explaining simple biological effects such as cell killing. Current models assume that DNA and its basic elements are immersed in water-like media and only model the production and diffusion of water-based radicals and their interaction with DNA structures; these models lack the cross sections associated with each macro-component of DNA and only treat water-based radicals. It has been found that such models are not realistic because DNA is not immersed in pure water. A computer code capable of simulating electron tracks, low-energy electrons, energy deposition in small molecules, and radical production and diffusion in water like media has been developed. This code is still in at a primitive stage and development is continuing. It is being used to study radical production by radiation, and radical diffusion and interactions in simple molecular systems following their production. We are extending the code to radical production by chemicals to complement our PBPK modeling efforts. It therefore has been developed primarily for use with radionuclides that are in biological materials, and not for radiation fields
Full Text Available South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.
Barnard, Antoni; Simbhoo, Nirvana
South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.
Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar
Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...
Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria
In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...
Calder-Dawe, Octavia; Gavey, Nicola
This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.
This book provides a comprehensive analysis of various solar based hydrogen production systems. The book covers first-law (energy based) and second-law (exergy based) efficiencies and provides a comprehensive understanding of their implications. It will help minimize the widespread misuse of efficiencies among students and researchers in energy field by using an intuitive and unified approach for defining efficiencies. The book gives a clear understanding of the sustainability and environmental impact analysis of the above systems. The book will be particularly useful for a clear understanding
Pawan Kumar, Kamalakannan Rajasekaran, Jeanne M Palmer, Monica S Thakar, Subramaniam Malarkannan
Full Text Available Tissue regeneration is a critical component of organ maintenance. The ability of lymphocytes to kill pathogen-infected cells has been well-studied. However, the necessity for lymphocytes to participate in reconstruction of destroyed tissues has not been explored until recently. Interleukin (IL-22, a newly defined cytokine exclusively produced by subsets of lymphocytes, provides the strongest proof yet for the tissue regenerative potentials of the immune system. IL-22 plays an obligatory role in epithelial homeostasis in the gut, liver and lung. The receptor for IL-22 (IL-22R1 and IL-10R2 is predominantly expressed by epithelial cells. While the pro-inflammatory effect is questioned, the pro-constructive potential of IL-22 is well established. It is evident from the response to IL-22, that epithelial cells not only produce anti-microbial peptides but also actively proliferate. Aryl hydrocarbon receptor (AhR and retinoic acid-related orphan receptor (RORγt transcription factor are required for IL-22 generation from Lymphoid Tissue inducer cells LTi, Th22 and NK-like cells. However, IL-22 production from conventional NK cells is independent of AhR and RORγt. In this review, we present a case for a paradigm shift in how we define the function of the immune system. This would include tissue regeneration as a legitimate immune function.
McPhee, William S.
The objective of this project is to improve the productivity and lower the expense of existing vacuum blasting technology. This technology is used to remove radioactive contamination, PCBs, and lead-based paint and provides worker protection by continuously recycling the material and dust for the decontamination tasks. The proposed work would increase the cleaning rate and provide safe and cost-effective decontamination of the DOE sites. This work focuses on redesigning and improving existing vacuum blasting technology including blast head nozzles, ergonomic handling of the blast head by reducing its weight; brush-ring design, vacuum level regulator, efficiency of the dust separator, and operational control sensors. The redesign is expected to enhance the productivity and economy of the vacuum blasting system by at least 50% over current vacuum blasting systems. There are three phases in the project. Phase I consists of developing and testing mathematical models. Phase II consists of pre-prototype design and fabrication and pre-prototype unit testing. Phase III consists of prototype design and field verification testing. In phase I, mathematical models are developed and analyzed for the nozzle, blast head, wind curtain, and dust separator, first as individual devices and then combined as an integrated model. This allows study of respective airflow and design parameters. The Contractor shall, based on the results of the mathematical modeling studies, design experimental models of the components and test these models. In addition, the Contractor shall develop sensors to detect the relationship of the blast head to the blast surfaces and controls to minimize the dependency on an operator's skill and judgment to obtain optimum positioning, as well as real-time characterization sensors to determine as the blast head is moving the depth to which coatings must be removed, thereby improving production and minimizing waste. In phase II, the Contractor shall design and
Walters, K.B.; Henderson, G.
The Cullen Enquiry into the Piper Alpha disaster in the U.K. North Sea recommended that an operator should formally present it's company Management System and demonstrate how safety is achieved throughout the life cycle of a platform, from design through operation to abandonment. Brunei Shell Petroleum has prepared a corporate level Safety Management System. As part of Safety Case work, the corporate system is being extended to include the development of specific Management Systems with particular emphasis on offshore production operations involving integrated oil and gas facilities. This paper will describe the development of Management Systems, which includes an intensive Business Process Analysis and will comment upon it's applicability and relationship to ISO 9000. The paper will further describe the applicability and benefits of Management Systems and offer guidance on required effort. The paper will conclude that development of structured Management Systems for safety critical business processes is worthwhile but prioritization of effort will be necessary. As such the full adoption of Management Systems will be directional in nature
Dubey, Prakash; Patidar, Rinku; Mishra, Vikas; Norman, Jasmine; Mangayarkarasi, R.
We explore whether a classifier can consistent1y verify c1ients and interact with the computer using camera and behavior of users. In this paper we propose a new way of authentication of user which wi1l capture many images of user in random time and ana1ysis of its touch biometric behavior. In this system experiment the touch conduct of a c1ient/user between an en1istment stage is stored in the database and it is checked its mean time behavior during equa1 partition of time. This touch behavior wi1l ab1e to accept or reject the user. This wi1l modify the use of biometric more accurate to use. In this system the work p1an going to perform is the user wi1l ask single time to a1low to take it picture before 1ogin. Then it wi1l take images of user without permission of user automatica1ly and store in the database. This images and existing image of user wi1l be compare and reject or accept wi1l depend on its comparison. The user touch behavior wi1l keep storing with number of touch make in equa1 amount of time of the user. This touch behavior and image wi1l fina1ly perform authentication of the user automatically.
Silva, Sílvio Carmo; Alves, Anabela Carvalho
This paper presents a procedure for the detailed design and redesign of manufacturing systems within a framework of constantly fitting production system configuration to the varying production needs of products. With such an approach is achieved the design of Product Oriented Manufacturing Systems – POMS. This approach is in opposition to the fitting, before hand, of a production system to all products within a company. In this case is usual to adopt a Function Oriented Manufactur...
and individual interviews with relevant guests at the Italian restaurant Sticchi’s in Aalborg, Denmark. Guests have been selected for qualitative interviews on the basis of the quantitative questionnaire that random guests have filled out in February 2013. Moreover, netnographic observation of the restaurant......Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...
Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)
One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.
To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.
Full Text Available The ideal real time personal authentication system should be fast and accurate to automatically identify a person’s identity. In this paper, we have proposed a palmprint based biometric authentication method with improvement in time and accuracy, so as to make it a real time palmprint authentication system. Several edge detection methods, wavelet transform, phase congruency etc. are available to extract line feature from the palmprint. In this paper, Multi-scale Sobel Code operators of different orientations (0?, 45?, 90?, and 135? are applied to the palmprint to extract Sobel-Palmprint features in different direc- tions. The Sobel-Palmprint features extracted are stored in Sobel- Palmprint feature vector and matched using sliding window with Hamming Distance similarity measurement method. The sliding win- dow method is accurate but time taking process. In this paper, we have improved the sliding window method so that the matching time reduces. It is observed that there is 39.36% improvement in matching time. In addition, a Min Max Threshold Range (MMTR method is proposed that helps in increasing overall system accuracy by reducing the False Acceptance Rate (FAR. Experimental results indicate that the MMTR method improves the False Acceptance Rate drastically and improvement in sliding window method reduces the comparison time. The accuracy improvement and matching time improvement leads to proposed real time authentication system.
Tackney, Charles T.
This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop ...
Ken L. Smith; Marc E. Leveque
The report herein is a summary of the work performed on three projects to demonstrate hydrocarbon drilling and production methods applicable to deep and ultra deepwater field developments in the Gulf of Mexico and other like applications around the world. This work advances technology that could lead to more economic development and exploitation of reserves in ultra-deep water or remote areas. The first project is Subsea Processing. Its scope includes a review of the ''state of the art'' in subsea components to enable primary production process functions such as first stage liquids and gas separation, flow boosting, chemical treatment, flow metering, etc. These components are then combined to allow for the elimination of costly surface production facilities at the well site. A number of studies were then performed on proposed field development projects to validate the economic potential of this technology. The second project involved the design and testing of a light weight production riser made of composite material. The proposed design was to meet an actual Gulf of Mexico deepwater development project. The various engineering and testing work is reviewed, including test results. The third project described in this report encompasses the development and testing of a close tolerance liner drilling system, a new technology aimed at reducing deepwater drilling costs. The design and prototype testing in a test well are described in detail.
Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.
Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
Dirik, Hasan Fehmi; Seren Intepeler, Seyda
This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.
Shirey, Maria R
Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.
Akers, Michael J
Both conventional and more advanced product container and delivery systems are the focus of this brief article. Six different product container systems will be discussed, plus advances in primary packaging for special delivery systems and needle technology.
Full Text Available Orientation: Authentic leadership is a relatively new construct that has recently gained increasing attention resulting from challenges faced by organisations relating to ethical meltdowns, corruption and fraud. Research purpose: This study seeks to explore the relationship between components of emotional intelligence and authentic leadership. Motivation for the study: Several authors called for more empirical investigations into the antecedents of authentic leadership. Despite the important role that emotions play in leadership, empirical studies were lacking about the influence of different components of emotional intelligence to authentic leadership. Research design, approach and method: Data were collected, using questionnaires obtained from 341 full-time employed applicants to MBA and leadership programmes in a South African Business School. Relationships between variables were analysed, using Pearson product-moment correlations and stepwise multiple regression. Main findings: The results indicated that emotional intelligence has positive statistically significant associations with authentic leadership. Specifically, those who scored high on all the emotional intelligence components also scored high on authentic leadership. In addition, the emotional intelligence component of empathy was a statistically significant predictor of authentic leadership. Practical/managerial implications: Initial findings suggest the potential value of recognising and developing the emotional intelligence of leaders to enable them to lead their organisations authentically to desired, successful outcomes. As empathy has been shown to be the most important emotional intelligence predictor of authentic leadership, leaders need to understand when subordinates perceive a leader as displaying empathic emotion. Contribution: This study contributes to the literature and empirical research on the antecedents of authentic leadership.
Rhijn, J.W. van; Looze, M.P. de; Schoenmaker, N.; Bosch, T.; Deursen, J. van
A negative aspect of serial flow production systems is its lack of flexibility. Other production systems like the flexing flow and the shopping system are more flexible as the number of workers can be easily adjusted to temporal demands. But how efficient are these flexible systems? In a laboratory
Giuseppe Schirripa Spagnolo
Full Text Available Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography.
Giacomelli, G.A.; Sase, S.; Cramer, R.; Hoogeboom, J.; McKenzie, A.; Parbst, K.; Sacrascia-Mugnozza, G.; Selina, P.; Sharp, D.A.; Voogt, J.O.; Weel, van P.A.; Mears, D.
Environmentally sound greenhouse production requires that: demand for market products is understood; greenhouse design addresses the climate circum-stances; input resources are available and consumed efficiently, and; there must be a reasonable balance of production products to the environmental
K. L. Smith; M. E. Leveque
This report includes technical progress made during the period October, 2003 through September, 2004. At the end of the last technical progress report, the subsea processing aspects of the work program had been dropped due to the lack of commercial opportunity within ConocoPhillips, and the program had been redirected towards two other promising deepwater technologies: the development and demonstration of a composite production riser, and the development and testing of a close-tolerance liner drilling system. This report focuses on these two technologies.
Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld
Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...
Teranishi, Isamu; Furukawa, Jun; Sako, Kazue
We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.
Full Text Available The challenge of better reconciling individual and collective aspects of innovative problem-solving can be productively addressed to enhance the role of PBL as a key focus of the creative process in future higher education. This should involve ‘active learning’ approaches supported by related processes of teaching, assessment and curriculum. As Biggs & Tan (2011 have suggested, an integrated or systemic approach is needed for the most effective practice of outcomes-based education also especially relevant for addressing relatively simple as well as more complex problems. Such a model will be discussed in relation to the practical example of a Masters subject conceived with interdisciplinary implications, applications, and transferability: ‘sustainable policy studies in science, technology and innovation’. Different modes of PBL might be encouraged in terms of the authentic kinds of ‘complex problem-solving’ issues and challenges which increasingly confront an interdependent and changing world. PBL can be further optimized when projects or cases also involve contexts and examples of research and inquiry. However, perhaps the most crucial pillar is a model of portfolio assessment for linking and encouraging as well as distinguishing individual contributions to collaborative projects and activities.
Petersen, Franziska Bork
' was understood in the Enlightenment and what techniques were used to stage the body when the concept gained currency, for instance in the writings of Rousseau. My analysis makes clear that 'bodily authenticity' on the two TV shows is achieved by strictly following gender-normative codes of beauty...... the 'authentic' ideal in a total of seven pieces. These strategies are hyperbole which exaggerates the beauty code implicit in 'authentic appearance'; multiplicity which undermines 'authenticity's' essentialism and estrangement which denies the notion of individual authorship. In conclusion, I place the staging...
Full Text Available The PhytoAuthent project was structured to gather, test, develop and apply, in real life case scenarios, molecular techniques, such as biochemical fingerprinting and DNA sequence-based methods, for plant identification of constituents in complex herbal products. The project had a strong focus on applied aspects like protecting consumers from health risks associated with product substitution and contamination of herbal products.
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
Murphy, Lin G
This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.
This research aims at relating the currently distant research domains of planning and distributed systems of authentication. The connection addressed here are the so called "smart contracts" and it is approached from an organizational studies perspective.
Balling, Laura Winther
Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...... proficient L2, English, while their eye-movements were monitored. The experiment shows a cognate advantage for morphologically simple words, but only when cognateness is defined relative to translation equivalents that are appropriate in the context. For morphologically complex words, a cognate disadvantage...... word predictability indexed by the conditional probability of each word....
Tupasela, Aaro Mikael; Tamminen, Sakari
The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced....... Using the case of human and non-human genetics to compare and contrast the various facets associated with genetic identity, we seek to develop a broader picture of the ways in which genetics plays an important role in stabilizing categories of origin....
Full Text Available In this ethnographic sketch, I analyze the complex processes of Sino-Islamic identity formation by examining the variety and diversity of locally produced “authenticity,” situated within a global understanding of Islam. Even within a single province, among a single official minzu (nationality that People’s Republic of China propaganda, media, and scholarship often construct as a unified, static group, localized practices and processes of identity formation are remarkably diverse. This article investigates how trans/national discourses and practices of Islamic authenticity are localized within two specific field sites: the provincial capital of Kunming and the rural Muslim enclave of Shadian. For the purposes of this article, I focus primarily on how life is temporally and spatially structured, both in everyday practice and in imaginings of one’s place in history, modernity, the Muslim world, and the Chinese state. By setting out details of the daily lives of two Hui Muslim women, I aim to elucidate how temporal and spatial structures of life, which are tied to urban or rural location, reflect and shape local identity formation. I argue that as actors involved in their own self-production, Hui Muslims in Kunming and Shadian negotiated, appropriated, and contested both monolithic notions of Islam and the official state-propagated minzu classificatory system, producing their own versions of authentic Hui Muslim identities. What constituted authentic Hui Muslim identity depended to a great extent on the residence of the individual.
Full Text Available Undergraduate courses provide valuable opportunities to train and empower students with the knowledge, skills, and motivation to advance society in more sustainable directions. This article emphasizes the value of bridging primary scientific research with undergraduate education through the presentation of an integrated experiential learning and primary research model called Farm-based Authentic Research Modules in Sustainability Sciences (FARMS. FARMS are collaboratively designed with agricultural stakeholders through a community needs assessment on pressing food system issues and opportunities with the objective for faculty and students to jointly identify evidence-based management solutions. We illustrate the implementation of FARMS in an undergraduate course in Ecological Agriculture at Dartmouth College, NH where students assessed various agroecological solutions for managing plant vitality, weeds, soil quality, pests, pollinators, and biodiversity at the Dartmouth Organic Farm. Student reflections indicate that the FARMS course component was beneficial for understanding agroecological theories and concepts while also motivating involvement in sustainability sciences despite the challenges of primary research. Educator reflections noted that the FARMS pedagogical approach facilitated achieving course objectives to develop students’ ability for systems thinking, critical thinking, and interdisciplinarity while fostering students’ collaboration skills and overall motivation for creating change. Adopting the FARMS model should enable faculty in the sustainability sciences to serve as bridges between the learning, practicing, and scientific communities while supporting educational programming at student and community farms. Ultimately, it is expected that the implementation of FARMS will increase student capacity and prepare the next generation of leaders to address complex challenges of the food system using an evidence-based approach.
Kraemer, U.A.F.; Salmela, M.; Mayer, V.
In our everyday lives, we talk about authentic and inauthentic emotions. Is this just a façon de parler that does not have any reference in the "real world?" I will support the thesis that it makes sense to talk about the authenticity of emotions in our everyday practice, disregarding the question
Bialystok, Lauren; Kukar, Polina
The educational enthusiasm for both authenticity and empathy makes a number of assumptions about universal virtues, self-hood, the role of emotion in education, and the role of the teacher. In this article, we argue that authenticity and empathy are both nebulous virtues that teachers and students are called to embody with little reflection on how…
Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.
Bistarelli, Stefano; Claudio, Viti
This paper reports the phases of study and implementation of a remote biometric authentication protocol developed during my internship at the I.i.t. of the C.n.r. in Pisa. Starting from the study of authentication history we had a look from the first system used since the 60ies to the latest technology; this helped us understand how we could realize a demonstration working protocol that could achieve a web remote authentication granting good reliability: to do this we choosed to modify the SS...
This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......, the paper explores the inherent paradox of the staging of authenticity. Rather than viewing the house solely from the perspective of the resident, the study ethnographically traces the entire process from design to occupancy in order to investigate how notions of value and authenticity are negotiated...
Jacobsen, Peter; Rudolph, Carsten
Design of production systems are rarely an activity in which decision makers in most production companies have much experience. In future, this activity is to be more recurrent due to more and more frequent changes in the production task. Consequently, the decision makers are in need of better...... management tools and methods for description and modelling of production systems supporting the decisions. In this article a structural framework to describe and model production systems will be introduced, and it is shown how the production system of a minor Danish manufacturer of electromechanical...
Edwards, Kasper; Pedersen, Jørgen Lindgaard
configurations. However, costs are but one parameter on which firms compete and firms must continually innovate new and develop existing products. This paper presents original empirical insights on implementation and use of product configuration systems in a number of Danish industrial firms. The paper discusses...... the organisational changes associated with PCS and how this affects product innovation and development. The paper begins by introducing product configuration systems, which are then placed in context to the firm as a process technology which coordinate different processes: product development, order acquisition......Product Configuration Systems (PCS) is a step in the direction of mass customization in the sense that PCS allows a firm to significantly lower the unit cost of configuration. Thus PCS is a valuable technology for lowering operating costs while retaining a high number of possible product...
Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.
PPIS includes registrant name and address, chemical ingredients, toxicity category, product names, distributor brand names, site/pest uses, pesticidal type, formulation code, and registration status for all products registered in the U.S.
Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang
An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme. (paper)
Donohue, John T.; Critchfield, Anna R.
We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.
Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man
To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.
Frumkin, Dan; Wasserstrom, Adam; Davidson, Ariane; Grafit, Arnon
Over the past twenty years, DNA analysis has revolutionized forensic science, and has become a dominant tool in law enforcement. Today, DNA evidence is key to the conviction or exoneration of suspects of various types of crime, from theft to rape and murder. However, the disturbing possibility that DNA evidence can be faked has been overlooked. It turns out that standard molecular biology techniques such as PCR, molecular cloning, and recently developed whole genome amplification (WGA), enable anyone with basic equipment and know-how to produce practically unlimited amounts of in vitro synthesized (artificial) DNA with any desired genetic profile. This artificial DNA can then be applied to surfaces of objects or incorporated into genuine human tissues and planted in crime scenes. Here we show that the current forensic procedure fails to distinguish between such samples of blood, saliva, and touched surfaces with artificial DNA, and corresponding samples with in vivo generated (natural) DNA. Furthermore, genotyping of both artificial and natural samples with Profiler Plus((R)) yielded full profiles with no anomalies. In order to effectively deal with this problem, we developed an authentication assay, which distinguishes between natural and artificial DNA based on methylation analysis of a set of genomic loci: in natural DNA, some loci are methylated and others are unmethylated, while in artificial DNA all loci are unmethylated. The assay was tested on natural and artificial samples of blood, saliva, and touched surfaces, with complete success. Adopting an authentication assay for casework samples as part of the forensic procedure is necessary for maintaining the high credibility of DNA evidence in the judiciary system.
and the level of abstraction used in the analysis. Thus, the goal of developing a high level methodology that can be used with different notions of security, authentication, and abstraction is worth considering. In this thesis, we propose a new methodology, called the structured intuition (SI), which addresses...... in our methodology, which is called canonicity, which is a weaker form of message authenticity. As compared to many contemporary analysis techniques, an SI based analysis provides detailed results regarding the design rationales and entity authentication goals of a protocol....... consequences for the security of the system, e.g., private information of legitimate parties may be leaked or the security policy of a trusted system may be violated. At a corporate level, such a failure of authentication may result in loss of proprietary technology or customers' credit card information...
Wiśniewska, Paulina; Dymerski, Tomasz; Wardencki, Waldemar; Namieśnik, Jacek
Whisky (whiskey) is one of the most popular spirit-based drinks made from malted or saccharified grains, which should mature for at least 3 years in wooden barrels. High popularity of products usually causes a potential risk of adulteration. Thus authenticity assessment is one of the key elements of food product marketing. Authentication of whisky is based on comparing the composition of this alcohol with other spirit drinks. The present review summarizes all information about the comparison of whisky and other alcoholic beverages, the identification of type of whisky or the assessment of its quality and finally the authentication of whisky. The article also presents the various techniques used for analyzing whisky, such as gas and liquid chromatography with different types of detectors (FID, AED, UV-Vis), electronic nose, atomic absorption spectroscopy and mass spectrometry. In some cases the application of chemometric methods is also described, namely PCA, DFA, LDA, ANOVA, SIMCA, PNN, k-NN and CA, as well as preparation techniques such SPME or SPE. © 2014 Society of Chemical Industry.
Wang, Xiaogang; Mei, Shengtao
Metasurfaces that consist of a monolayer of photonic artificial atoms are emerging as attractive materials for optical wavefront-shaping and polarization-control devices. By integrating nanophotonics with a phase-encoding technique, we demonstrate theoretically an information authentication method using dielectric metasurfaces that can be verified without information disclosure at visible wavelengths. The required secured diffraction pattern can be simply achieved by a metasurface hologram with a small number of pixels, which means increased efficiency and lower costs of production. Although the decrypted image is noisy, it can be authenticated by recognition algorithms where the primary image is used as a reference. The results show that the dielectric metasurface approach, providing great flexibility in the design of the wavefront of light and compatible with the CMOS technology, can be potentially applied in optical information security. (letter)
Feng Haiqiang; Pan Zhiqiang; Yu Cuiping; Wang Xiaochang
Organic agricultural products were always adulterated by pollutant-free agricultural products in market because of lacking of available authentication technique. Organic tea was one of the largest organic agricultural products in China which are facing the same problem and can not be accepted by consumers. In this paper, based on the newest information of δ 15 N from soil-plant-fertilizer system, a new method was suggested to identify whether N fertilizer was applied to organic tea in producing processing. Meanwhile, the principle of this new method and its feasibility were discussed. (authors)
Karlsson, Christer; Christensen, Irene
Production systems enabling both cost efficiency and flexibility in terms of high product variation are explored. The study follows an explorative longitudinal field study approach. The database consists of three large global corporations, each consisting of several companies producing household ......-outs, worker skills, integration of distribution channels, after sales service and degree of servitization. Three production system design principles called VXY emerge....
Hu, Jun-mei; Wang, Xin-jie
Based on the introduction of agricultural cleaner production, technology system design of planting cleaner production is discussed from five aspects of water-saving irrigation technology, fertilization technology, diseases and insects control technology, straw comprehensive utilization technology and plastic film pollution control technology. Cleaner production technology system of livestock and poultry raise is constructed from the aspects of source control technology, reduction technique in...
Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.
Tan, Adrian; McAloone, Timothy Charles; Gall, Catherine
‘Product/service-systems’ (PSS) are innovation strategies where instead of focusing on the value of selling physical products, one focuses on the value of the utility of products and services throughout the product’s life period. This approach enables companies to provide customers with offerings...... that continuously deliver value and create a strong competitive advantage. PSS attempts to transcend the old industrial credo that value is embedded in products and the consideration of ‘cost-quality-time’ relates to the physical artefact. While there is increasing interest in PSS, limited research has been done...
NORSK: I de senere årene har mediefokuset vært rettet mot sikkerhet. Et av kravene innenfor sikkerhet, er økt behov for korrekt autentisering av en person. Det er mulig å autentisere seg ved å fremlegge bevis på noe du vet (for eksempel et passord), noe du har (for eksempel et ID-kort) eller noe du er (for eksempel biometri). Denne undersøkelsen forsøker å finne ut av i hvilken grad mulige brukere av biometriske autentiseringssystemer har tillit til et slikt system. Deltakerne ...
Biancini, A.; Florio, L.; Haase, M.; Hardt, M.; Jankowski, M.; Jensen, J.; Kanellopoulos, C.; Liampotis, N.; Licehammer, S.; Memon, S.; van Dijk, N.; Paetow, S.; Prochazka, M.; Sallé, M.; Solagna, P.
AARC (Authentication and Authorisation for Research Communities) is a two-year EC-funded project to develop and pilot an integrated cross-discipline authentication and authorisation framework, building on existing authentication and authorisation infrastructures (AAIs) and production federated infrastructure. AARC also champions federated access and offers tailored training to complement the actions needed to test AARC results and to promote AARC outcomes. This article describes a high-level ...
Over past decade cloud services have enabled individuals and organizations to perform different types of tasks such as online storage, email services, on-demand movies and TV shows. The cloud services has also enabled on-demand deployment of applications, at cheap cost with elastic and scalable, fault tolerant system. These cloud services are offered by cloud providers who use authentication, authorization and accounting framework based on client-server model. Though this model has been used ...
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...
Hopkins, Margaret M; O'Neil, Deborah A
The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.
Hopkins, Margaret M.; O?Neil, Deborah A.
The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.
This Web page describes the continuing effort to modernize the federal regulatory system for biotechnology products as well as clarify various roles of EPA, FDA and USDA in evaluating new biotechnology products.
Ciepielowski, Grzegorz; Pacholczyk-Sienicka, Barbara; Frączek, Tomasz; Klajman, Kamila; Paneth, Piotr; Albrecht, Łukasz
The production of "Polish Vodka" is restricted by law to the ethyl alcohol of agricultural origins obtained from rye, wheat, barley, oat, triticale and potatoes grown on the territory of the Republic of Poland. The current labeling system should guarantee that the spirit is authentic and of good quality but not all producers are honest. Unfortunately, the authentic "Polish Vodka" is the most often counterfeited by the addition of cheaper and more accessible maize spirits. These illegal practices significantly reduce costs of the spirit production. Therefore, the determination of the botanical origin of alcohol in Poland is highly relevant. The quantitative 2 H NMR and isotope ratio mass spectrometry (IRMS) were used to investigate the authenticity of 30 samples of Polish spirits. Several isotopic parameters were used to determine the botanical origin of 10 unknown samples. Both approaches lead to the same conclusions regarding the percentage of maize-derived ethanol addition. Applied techniques are a valuable tool in the fight against counterfeiting of products. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
Kane, D; McStay, D; Mulholland, J; Costello, L
The use of wireless sensor networks for monitoring and optimising the performance of surface hydrocarbon production systems is reported. Wireless sensor networks are shown to be able to produce comprehensively instrumented XTs and other equipment that generate the data required by Intelligent Oilfield systems. The information produced by such systems information can be used for real-time operational control, production optimization and troubleshooting.
Ali Al Shidhani
Full Text Available Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.
Rintala, Mikko; Sormunen, Jussi; Kuisma, Petri; Rahkala, Matti
Automation systems are used in most buildings nowadays. In the past they were mainly used in industry to control and monitor critical systems. During the past few decades the automation systems have become more common and are used today from big industrial solutions to homes of private customers. With the growing need for ecologic and cost-efficient management systems, home and building automation systems are becoming a standard way of controlling lighting, ventilation, heating etc. Auto...
National Oceanic and Atmospheric Administration, Department of Commerce — The Soil Moisture Operational Products System (SMOPS) combines soil moisture retrievals from multiple satellite sensors to provide a global soil moisture map with...
Lancaster, Ian M.
The use of holograms as authentication or security devices is the most valuable application of holograms yet devised. In 20 years, this has developed from the first use of a hologram on credit cards, to the situation today where governments turn to holograms as a key security feature on the protected documents they issue, including banknotes, identity documents and tax banderols. At the same time, holograms (and related devices) are the most recognised visible feature used to authenticate and protect branded and OEM products; this sector covers the gamut from CD jewel-box seals to the protection of safety-related items such as medicines and vehicle replacement parts. There has been creative synergy between the commercial suppliers of such holograms and the practical holography community. But new technologies are coming forward to challenge the role of holograms, a challenge that is aided by the counterfeiting of security holograms. What are the characteristics of those technologies and can holograms provide similar resources to users? Examples of collaboration between hologram producers and producers of other technologies to create combination devices suggest a possible route forward for holography to maintain its role in authentication and security. By scrutinising and adapting to needs, often by combination with other techniques, holographers may be able to retain their role in this important application.
Jacobsen, Robert; Nielsen, Morten
In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....
Klein, Steven Karl [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kimpland, Robert Herbert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
The success of this theoretical undertaking provided confidence that the behavior of new and evolving designs of fissile solution systems may be accurately estimated. Scaled up versions of SUPO, subcritical acceleratordriven systems, and other evolutionary designs have been examined.
Lee, Hwayean; Lim, Jongin; Yang, HyungJin
We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states
Nowadays, replacing traditional authentication methods with authentication and authorization infrastructures (AAIs) comes down to trading several passwords for one master password, which allows users to access all services in a federation. Having only one password may be comfortable for the user, but it also raises the interest of potential impostors, who may try to overcome the weak security that a single password provides. A solution to this issue would be a more-factor AAI, combining the p...
Ferreiro-González, Marta; Barbero, Gerardo F; Álvarez, José A; Ruiz, Antonio; Palma, Miguel; Ayuso, Jesús
Adulteration of olive oil is not only a major economic fraud but can also have major health implications for consumers. In this study, a combination of visible spectroscopy with a novel multivariate curve resolution method (CR), principal component analysis (PCA) and linear discriminant analysis (LDA) is proposed for the authentication of virgin olive oil (VOO) samples. VOOs are well-known products with the typical properties of a two-component system due to the two main groups of compounds that contribute to the visible spectra (chlorophylls and carotenoids). Application of the proposed CR method to VOO samples provided the two pure-component spectra for the aforementioned families of compounds. A correlation study of the real spectra and the resolved component spectra was carried out for different types of oil samples (n=118). LDA using the correlation coefficients as variables to discriminate samples allowed the authentication of 95% of virgin olive oil samples. Copyright © 2016 Elsevier Ltd. All rights reserved.
Pedersen, Jørgen Lindgaard; Edwards, Kasper
with informations about expected and realised costs and benefits in implemented PCS's we have the following results: the three highest aggregated scoring expected benefits are: 1)improved quality in specifications, 2)lower turnaround time, and 3)using less resources.The results achieved are in accordance......Product Configuration Systems (PCS) are systems to produce quotations to potential buyers of the products an enterprise produces. Typically the products are complex and will first be produced according to specific needs from the customers. From twelve case studies in Danish industry...
... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...
Hsuan, Juliana; McAloone, Tim C.; Neugebauer, Line
We apply a management tool to classify different integrated PSS within the context of Danish maritime industry. We investigate how a firm should organize its operations to manage the transition from being a manufacturing to a servitizing company, and to provide a guideline for strategic positioni...... and planning of the balance between product sales and service activities....
Nielsen, Thomas Dyhre; Jensen, Finn Verner
We present a new methodology for detecting faults and abnormal behavior in production plants. The methodology stems from a joint project with a Danish energy consortium. During the course of the project we encountered several problems that we believe are common for projects of this type. Most...
Olive oil authentication: A comparative analysis of regulatory frameworks with especial emphasis on quality and authenticity indices, and recent analytical techniques developed for their assessment. A review.
Bajoub, Aadil; Bendini, Alessandra; Fernández-Gutiérrez, Alberto; Carrasco-Pancorbo, Alegría
Over the last decades, olive oil quality and authenticity control has become an issue of great importance to consumers, suppliers, retailers, and regulators in both traditional and emerging olive oil producing countries, mainly due to the increasing worldwide popularity and the trade globalization of this product. Thus, in order to ensure olive oil authentication, various national and international laws and regulations have been adopted, although some of them are actually causing an enormous debate about the risk that they can represent for the harmonization of international olive oil trade standards. Within this context, this review was designed to provide a critical overview and comparative analysis of selected regulatory frameworks for olive oil authentication, with special emphasis on the quality and purity criteria considered by these regulation systems, their thresholds and the analytical methods employed for monitoring them. To complete the general overview, recent analytical advances to overcome drawbacks and limitations of the official methods to evaluate olive oil quality and to determine possible adulterations were reviewed. Furthermore, the latest trends on analytical approaches to assess the olive oil geographical and varietal origin traceability were also examined.
After a general introductory chapter, the subject is treated under three headings: paintings, ceramics and metals. The scientific tests for authenticity are described in their application to one or more of these branches of art. The traditional method of visual stylistic judgement is compared with and supplemented by scientific methods which (as well as 'wet' chemical analysis, optical microscopy, ultraviolet, infrared, electron and X-ray microscopy, X-ray crystallography and X-ray fluorescence, and direct age determination) include the following or more direct 'nuclear' interest: neutron (or proton, deuteron and high-energy photon) activation analysis for determining impurity and trace element content, gamma radiography for bronzes, neutron autoradiography or examining paintings, radiocarbon dating, other isotope dating (e.g. with lead isotopes and the radium-lead ratio), high temperature thermoluminescence for ceramics, and mass spectroscopy to determine isotope ratios indicative of particular sources of materials. As well as the reference in each chapter there is an additional bibliography. (U.K.)
Pereira, Leonor; Gomes, Sónia; Barrias, Sara; Fernandes, José Ramiro; Martins-Lopes, Paula
Olive oil and wine production have a worldwide economic impact. Their market reliability is under great concern because of the increasing number of fraud and adulteration attempts. The need for a traceability system in all its extension is crucial particularly for the cases of olive oils and wines with certified labels, in which only a limited number of olives and grapevine varieties, respectively, are allowed in a restricted well-defined geographical area. Molecular markers have been vastly applied to the food sector, and in particular High-Resolution DNA Melting technology has been successfully applied for olive oil and wine authentication, as part of the traceability system. In this review, the applications of HRM and their usefulness for this sector considering, Safety, Security and Authenticity will be reviewed. A broad overview of the HRM technique will be presented, focusing on the aspects that are crucial for its success, in particular the new generation of fluorescent dsDNA dyes used for amplicon detection and quantification, and the data analysis. A brief outlook on the olive oil and wine authenticity procedures, based on new DNA technology advances, and in which way this may influence the future establishment of a traceability system will be discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.
McPhee, William S.
The Department of Energy (DOE) needs improved technologies to decontaminate large areas of both concrete and steel surfaces. The technology should have high operational efficiency, minimize exposures to workers, and produce low levels of secondary waste. In order to meet the DOE's needs, an applied research and development project for the improvement of a current decontamination technology, Vacuum Blasting, is proposed. The objective of this project is to improve the productivity and lower the expense of the existing vacuum blasting technology which has been widely used in DOE sites for removing radioactive contamination, PCBs, and lead-based paint. The proposed work would increase the productivity rate and provide safe and cost-effective decontamination of the DOE sites
Ding, Yi; Østergaard, Jacob; Peng, Wang
A photovoltaic (PV) system consists of many solar panels, which are connected in series, parallel or a combination of both. Energy production for the PV system with various configurations is different. In this paper, a methodology is developed to evaluate and analyze the expected energy production...
Zhou, Yan; Jiang, He; Yang, Xiaoxia; Geng, Erhui
Snow is solid state of water resources on earth, and plays an important role in human life. Satellite remote sensing is significant in snow extraction with the advantages of cyclical, macro, comprehensiveness, objectivity, timeliness. With the continuous development of remote sensing technology, remote sensing data access to the trend of multiple platforms, multiple sensors and multiple perspectives. At the same time, in view of the remote sensing data of compute-intensive applications demand increase gradually. However, current the producing system of remote sensing products is in a serial mode, and this kind of production system is used for professional remote sensing researchers mostly, and production systems achieving automatic or semi-automatic production are relatively less. Facing massive remote sensing data, the traditional serial mode producing system with its low efficiency has been difficult to meet the requirements of mass data timely and efficient processing. In order to effectively improve the production efficiency of NDSI products, meet the demand of large-scale remote sensing data processed timely and efficiently, this paper build NDSI products production system based on Hadoop platform, and the system mainly includes the remote sensing image management module, NDSI production module, and system service module. Main research contents and results including: (1)The remote sensing image management module: includes image import and image metadata management two parts. Import mass basis IRS images and NDSI product images (the system performing the production task output) into HDFS file system; At the same time, read the corresponding orbit ranks number, maximum/minimum longitude and latitude, product date, HDFS storage path, Hadoop task ID (NDSI products), and other metadata information, and then create thumbnails, and unique ID number for each record distribution, import it into base/product image metadata database. (2)NDSI production module: includes
Pathan, Al-Sakib Khan; Hong, Choong Seon
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authenti...
... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Requests for authentication or certification of records. 1612.4 Section 1612.4 Protection of Environment CHEMICAL SAFETY AND HAZARD INVESTIGATION BOARD PRODUCTION OF RECORDS IN LEGAL PROCEEDINGS § 1612.4 Requests for authentication or...
K. L. Smith; M. E. Leveque
This report includes technical progress made during the period October, 2002 through September, 2003. At the end of the second technical progress report, the ConocoPhillips opportunities to apply subsea processing in the Gulf of Mexico had been exhausted, and an alternative site was identified in Norway. This was a non-ConocoPhillips operated field, and the subsea processing was proposed as a phased development approach with 2-phase separation at the field, and then gas and liquids exported via pipeline to remote platform locations for processing. Although the unrisked economics were quite favorable, the risked economic evaluation compelled the operator to develop the field with the more conventional and proven Floating Production, Storage and Offloading (FPSO) option. Work on the subsea processing was suspended at this time. Discussions with DOE regarding two other step-change deepwater technologies ensued. One was an effort to develop a light-weight, high pressure composite production riser. A field demonstration of the design would then be performed by deploying a limited number of composite joints in a Gulf of Mexico deepwater development. The other was to begin the process of taking drilling with casing technology to the deepwater. This is called, ''close-tolerance liner drilling''. It was agreed that both technologies should be pursued, and the work began. During this reporting period, the initial production riser design had been completed and preliminary test sample components were being fabricated. Regarding the liner drilling, the sub-contractors were selected, the design basis was agreed and designs progressed towards meeting a projected first quarter, 2004 onshore test program.
Full Text Available Integrated monitoring system for discrete manufacturing processes is presented in the paper. The multilayer hardware and software reference model was developed. Original research are an answer for industry needs of the integration of information flow in production process. Reference model corresponds with proposed data model based on multilayer data tree allowing to describe orders, products, processes and save monitoring data. Elaborated models were implemented in the integrated monitoring system demonstrator developed in the project. It was built on the base of multiagent technology to assure high flexibility and openness on applying intelligent algorithms for data processing. Currently on the base of achieved experience an application integrated monitoring system for real production system is developed. In the article the main problems of monitoring integration are presented, including specificity of discrete production, data processing and future application of Cyber-Physical-Systems. Development of manufacturing systems is based more and more on taking an advantage of applying intelligent solutions into machine and production process control and monitoring. Connection of technical systems, machine tools and manufacturing processes monitoring with advanced information processing seems to be one of the most important areas of near future development. It will play important role in efficient operation and competitiveness of the whole production system. It is also important area of applying in the future Cyber-Physical-Systems that can radically improve functionally of monitoring systems and reduce the cost of its implementation.
Kim, Dohyun; Alexoff, David; Kim, Sung Won; Hooker, Jacob M.; Ferrieri, Richard A.
A method for providing .sup.11C-labeled cyanides from .sup.11C labeled oxides in a target gas stream retrieved from an irradiated high pressure gaseous target containing O.sub.2, wherein .sup.11C labeled oxides are reduced with H.sub.2 in the presence of a nickel catalyst under a pressure and a temperature sufficient to form a product stream comprising at least about 95% .sup.11CH.sub.4, the .sup.11CH.sub.4 is then combined with an excess of NH.sub.3 in a carrier/reaction stream flowing at an accelerated velocity and the combined .sup.11CH4 carrier/reaction stream is then contacted with a platinum (Pt) catalyst particulate supported on a substantially-chemically-nonreactive heat-stable support at a temperature of at least about 900.degree. C., whereby a product stream comprising at least about 60% H.sup.11CN is provided in less than 10 minutes from retrieval of the .sup.11C labeled oxide.
de Barcellos, Marcia Dutra; Grunert, Klaus G; Zhou, Yanfeng
In many Western countries, consumers have shown an increasing interest to the way in which food products are being produced. This study investigates Chinese consumers' attitudes towards different pig production systems by means of a conjoint analysis. While there has been a range of studies...... on Western consumers' attitudes to various forms of food production, little is known about the level of Chinese consumers' attitudes. A cross-sectional survey was carried out with 472 participants in six Chinese cities. Results indicate that Chinese consumers prefer industrial pig production systems, where...... from Cluster 1 focus almost exclusively on the food safety aspect (food safety focused). Consumers from cluster 2 (indifferent) show generally weak attitudes to pig production systems in general. Cluster 3 (industrial production oriented) stands out by being very positive about industrial, large size...
In this classic text, Taiichi Ohno--inventor of the Toyota Production System and Lean manufacturing--shares the genius that sets him apart as one of the most disciplined and creative thinkers of our time. Combining his candid insights with a rigorous analysis of Toyota's attempts at Lean production, Ohno's book explains how Lean principles can improve any production endeavor. A historical and philosophical description of just-in-time and Lean manufacturing, this work is a must read for all students of human progress. On a more practical level, it continues to provide inspiration and instruction for those seeking to improve efficiency through the elimination of waste.
Full Text Available The paper presents the technology and organization of the artistic cast production. On the basis of the actual cast production system, the manufacturing process was shown, in particular sand–piece moulding, which is a very important process and a time-consuming part of the entire manufacture of the casts. The current state of the production process as well as the organization of the work and production technology were analysed with the use of methods and techniques of production improvement, the Lean Manufacturing concept and computer systems. The results of the analysis and studies were shown with use of schemes and graphs of the layout of the production resources, a flow chart of the production process, value stream mapping, and a costs table for the production and modernization of the moulding stage. The work has shown that there are possibilities to improve the artistic cast production system. This improvement leads to increased productivity, lower production costs of artistic casts and increased competitiveness of the foundry.
Cotton, Charles E.; Pillow, Linda K.; Perkinson, Robert C.; Brownlie, R. P.; Chwalowski, P.; Carmona, M. F.; Coopersmith, J. P.; Goff, J. C.; Harvey, L. L.; Kovacs, L. A.
The design and construction phase is summarized of the Mars oxygen demonstration project. The basic hardware required to produce oxygen from simulated Mars atmosphere was assembled and tested. Some design problems still remain with the sample collection and storage system. In addition, design and development of computer compatible data acquisition and control instrumentation is ongoing.
Chen, Huifang; Ge, Linlin; Xie, Lei
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.
Sørensen, J T; Edwards, S; Noordhuizen, J; Gunnarsson, S
The production of food from animal origin is relatively stable in the industrialised world. However, animal production systems are changing dramatically with respect to location, herd size and specialisation. Increased pressure from a critical public is moving animal-based production towards systems such as organic production and loose-housing systems which allow the animals to better express normal behaviour. The focus on food safety promotes systems with a high degree of biosecurity, often associated with an increase in herd size and self-containment. The globalisation of agricultural trade and increased competition also favours an increase in herd size and specialisation. These trends also lead to regions with livestock-dense areas, giving rise to environmental concerns. Therefore, good farming practice regulations and systems to provide a higher level of transparency, such as quality risk management programmes, are being developed.
Pratas, Nuno; Pattathil, Sarath; Stefanovic, Cedomir
We present a connection establishment protocol with integrated authentication, suited for Massive Machine-Type Communications (mMTC). The protocol is contention-based and its main feature is that a device contends with a unique signature that also enables the authentication of the device towards...... the network. The signatures are inspired by Bloom filters and are created based on the output of the MILENAGE authentication and encryption algorithm set, which is used in the authentication and security procedures in the LTE protocol family.We show that our method utilizes the system resources more...
Hvam, Lars; Haug, Anders; Mortensen, Niels Henrik
This article presents a study of the benefits obtained from applying product configuration systems based on a case study in four industry companies. The impacts are described according to main objectives in literature for imple-menting product configuration systems: lead time in the specification...... affected by the use of product configu-ration systems e.g. increased sales, decrease in the number of SKU's, improved ability to introduce new products, and cost reductions.......This article presents a study of the benefits obtained from applying product configuration systems based on a case study in four industry companies. The impacts are described according to main objectives in literature for imple-menting product configuration systems: lead time in the specification...... processes, on-time delivery of the specifica-tions, and resource consumption for making specifications, quality of specifications, optimization of products and services, and other observations. The purpose of the study is partly to identify specific impacts observed from implementing product configuration...
Full Text Available This paper proposes a real-time system for face authentication, obtained through fusion of Infra Red (IR and visible images. In order to identify the unknown person authentication in highly secured areas, multiple algorithms are needed. The four well known algorithms for face recognition, Block Independent Component Analysis(BICA, Kalman Filtering(KF method, Discrete Cosine Transform(DCT and Orthogonal Locality Preserving Projections (OLPP are used to extract the features. If the data base size is very large and the features are not distinct then ambiguity will exists in face recognition. Hence more than one sensor is needed for critical and/or highly secured areas. This paper deals with multiple fusion methodology using weighted average and Fuzzy Logic. The visible sensor output depends on the environmental condition namely lighting conditions, illumination etc., to overcome this problem use histogram technique to choose appropriate algorithm. DCT and Kalman filtering are holistic approaches, BICA follows feature based approach and OLPP preserves the Euclidean structure of face space. These recognizers are capable of considering the problem of dimensionality reduction by eliminating redundant features and reducing the feature space. The system can handle variations like illumination, pose, orientation, occlusion, etc. up to a significant level. The integrated system overcomes the drawbacks of individual recognizers. The proposed system is aimed at increasing the accuracy of the person authentication system and at the same time reducing the limitations of individual algorithms. It is tested on real time database and the results are found to be 96% accurate.
Seddon, John; Caulkin, Simon
Systems thinking underpins "lean" management and is best understood through action-learning as the ideas are counter-intuitive. The Toyota Production System is just that--a system; the failure to appreciate that starting-place and the advocacy of "tools" leads many to fail to grasp what is, without doubt, a significant…
The thesis of Alex Alblas presents a design reuse strategy for firms producing complex products and systems (CoPS). Examples of CoPS include industrial machinery, oil-rigs, electrical power distribution systems, integrated mail processing systems and printing press machinery. CoPS firms are
Arlianty, Widinda Normalia; Febriana, Beta Wulan; Diniaty, Artina; Fauzi'ah, Lina
This research is conducted to get an overview of the use of authentic assessment in the department of chemistry education, Islamic University of Indonesia. This research was conducted on the students of semester five, odd semester of academic year 2016/2017. Authentic assessment is an assessment process that is capable of measuring the knowledge, attitudes and skills of learners. Chemistry teacher candidates are required to be equipped with teaching and judging skills. Teachers were required can design and carry out assessment of the process and learning outcomes of students in an objective, accountable, and informative. Teacher creativity is required in the assessment. Therefore, authentic assessment is very appropriate used to improve the competence of students in education department as teachers candidates in the preparation of learning assessments.
Rojas, María; González, Isabel; Pavón, Miguel Angel; Pegels, Nicolette; Lago, Adriana; Hernández, Pablo E; García, Teresa; Martín, Rosario
Species-specific real-time polymerase chain reaction (PCR) assays using TaqMan probes have been developed for verifying the labeling of meat and commercial meat products from game birds, including quail, pheasant, partridge, guinea fowl, pigeon, Eurasian woodcock and song thrush. The method combines the use of species-specific primers and TaqMan probes that amplify small fragments (amplicons meat products from the target species demonstrated the suitability of the assay for the detection of the target DNAs.
Kouzes, Richard T.; Hansen, Randy R.; Pitts, W. K.
During the Trilateral Initiative Technical Workshop on Authentication and Certification, PNNL will demonstrate some authentication technologies. This paper briefly describes the motivation for these demonstrations and provide background on them
Margaret M. Hopkins
Full Text Available This article provides an overview and critique of authentic leadership, with particular arguments given to support the premise that authentic leadership is a gendered representation of leadership.
Klein, De Cecile A.M.; Monaghan, Ross M.; Alfaro, Marta A.; Gourley, Cameron J.P.; Oenema, Oene; Mark Powell, J.
Nitrogen (N) is invaluable for maintaining agricultural production, but its use, and particularly inefficient use, can lead to environmental losses. This paper reviews N use efficiency (NUE) and N surplus indicators for dairy production systems to assess their utility for optimising N use outcomes
Regan, John M.; Yan, Hengjing
by exoelectrogens at the anode. As an indirect approach to biohydrogen production, these systems are not subject to the hydrogen yield constraints of fermentative processes and have been proven to work with virtually any biodegradable organic substrate
U.S. Environmental Protection Agency — The High Production Volume Information System (HPVIS) provides access to select health and environmental effect information on chemicals that are manufactured in...
models of aquacultural production systems with the aim of adopting a suitable one for ... of predicting the environmental condition, so as to determine point of diminishing returns and optimize yield in an ..... sale of fish are also tracked.
This paper discusses a new concept in overt security called the self-authenticating banknote. The self-authenticating banknote concept is built around the transparent window feature of the polymer banknote. This feature allows the incorporation of transmission based optical devices on a banknote so that the user, by folding the note over on itself and looking through an optical device which is a part of the note itself, can visually inspect and verify certain security features on the banknote. This paper presents a number of examples of optical devices which are presently being developed for this purpose.
North, Nicola; Hughes, Frances
Recent New Zealand reports have identified the nursing workforce for its potential to make a significant contribution to increased productivity in health services. The purpose of this paper is to review critically the recent and current labour approaches to improve nursing productivity in New Zealand, in a context of international research and experience. An examination of government documents regarding productivity, and a review of New Zealand and international literature and research on nursing productivity and its measurement form the basis of the paper. It is found that productivity improvement strategies are influenced by theories of labour economics and scientific management that conceptualise a nurse as a labour unit and a cost to the organisation. Nursing productivity rose significantly with the health reforms of the 1990s that reduced nursing input costs but impacts on patient safety and nurses were negative. Current approaches to increasing nursing productivity, including the "productive ward" and reconfiguration of nursing teams, also draw on manufacturing innovations. Emerging thinking considers productivity in the context of the work environment and changing professional roles, and proposes reconceptualising the nurse as an intellectual asset to knowledge-intensive health organisations. Strategies that take a systems approach to nursing productivity, that view nursing as a capital asset, that focus on the interface between nurse and working environment and measure patient and nurse outcomes are advocated. The paper shows that reframing nursing productivity brings into focus management strategies to raise productivity while protecting nursing and patient outcomes.
Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen
This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…
Simmler, Charlotte; Graham, James G; Chen, Shao-Nong; Pauli, Guido F
This article reviews and develops a perspective for the meaning of authenticity in the context of quality assessment of botanical materials and the challenges associated with discerning adulterations vs. contaminations vs. impurities. Authentic botanicals are by definition non-adulterated, a mutually exclusive relationship that is confirmed through the application of a multilayered set of analytical methods designed to validate the (chemo)taxonomic identity of a botanical and certify that it is devoid of any adulteration. In practice, the ever-increasing sophistication in the process of intentional adulteration, as well as the growing number of botanicals entering the market, altogether necessitate a constant adaptation and reinforcement of authentication methods with new approaches, especially new technologies. This article summarizes the set of analytical methods - classical and contemporary - that can be employed in the authentication of botanicals. Particular emphasis is placed on the application of untargeted metabolomics and chemometrics. An NMR-based untargeted metabolomic model is proposed as a rapid, systematic, and complementary screening for the discrimination of authentic vs. potentially adulterated botanicals. Such analytical model can help advance the evaluation of botanical integrity in natural product research. Copyright © 2017. Published by Elsevier B.V.
Guo, Lili; Wu, Yajun; Liu, Mingchang; Ge, Yiqiang; Chen, Ying
Edible bird's nests (EBNs) have been traditionally regarded as a kind of medicinal and healthy food in China. For economic reasons, they are frequently subjected to adulteration with some cheaper substitutes, such as Tremella fungus, agar, fried pigskin, and egg white. As a kind of precious and functional product, it is necessary to establish a robust method for the rapid authentication of EBNs with small amounts of samples by simple processes. In this study, the Fourier transform infrared spectroscopy (FTIR) system was utilized and its feasibility for identification of EBNs was verified. FTIR spectra data of authentic and adulterated EBNs were analyzed by chemometrics analyses including principal component analysis, linear discriminant analysis (LDA), support vector machine (SVM) and one-class partial least squares (OCPLS). The results showed that the established LDA and SVM models performed well and had satisfactory classification ability, with the former 94.12% and the latter 100%. The OCPLS model was developed with prediction sensitivity of 0.937 and specificity of 0.886. Further detection of commercial EBN samples confirmed these results. FTIR is applicable in the scene of rapid authentication of EBNs, especially for quality supervision departments, entry-exit inspection and quarantine, and customs administration. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.
Theatrical activities are widely used by language educators to promote and facilitate language learning. Involving students in production of their own video or a short movie in the target language allows a seamless fusion of language learning, art, and popular culture. The activity is also conducive for creating an authentic learning situation…
Full Text Available Theatrical activities are widely used by language educators to promote and facilitate language learning. Involving students in production of their own video or a short movie in the target language allows a seamless fusion of language learning, art, and popular culture. The activity is also conducive for creating an authentic learning situation where the real world becomes a part of the educational experience and necessitates the use of an authentic language by the learners. This article describes a video project carried out by Russian language learners at Universiti Malaysia Sabah (UMS. It examines how the work on the project created and supported authenticity of the learning experience. Though the article focuses on the video project done in the context of language learning and teaching this activity could be successfully implemented in teaching various subjects at both secondary and tertiary levels.
Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori
propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...
Huxel, Alexa C.
What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…
Frazier, Brandy N.; Gelman, Susan A.
This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…
... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...
Mortensen, Niels Henrik; Hvam, Lars; Haug, Anders
This article presents an evaluation of applying a suggested method for modelling product families for product configuration based on theory for modelling mechanical products,systems theory and object-oriented modelling. The modelling technique includes a so-called product variant master and CRC-cards...... the three views. Modelling of characteristics of the product variants in a product family Modelling of constraints between parts in the product family Visualisation of the entire product family on a poster e.g. 1x2 meters The product variant master and CRC-cards are means to bridge the gap between domain...... experts and IT-developers, thus making it possible for the domain experts (e.g. engineers from product development) to express their knowledge in a form that is understandable both for the domain experts and the IT-developers. The product variant master and CRC-cards have currently been tested and further...
Individual customization of goods and processes in different industries leads to complexity due to a growing mix of products both regarding characteristics of products and support services. In order to eliminate complexity and challenges in product/process customizing, smart IT systems called...... Product Configuration Systems (PCS), have been proposed as the solution both by researchers and practitioners and various benefits are mentioned from utilizing PCSs. Based on the latest literature, there are challenges reported in all phases of PCS projects including planning, development......, and documentation. Moreover, the challenges become more serious when it involves complicated products/processes in engineer-to-order (ETO) companies. The purpose of this thesis is to contribute to the existing knowledge of managing PCS projects by proposing frameworks and tools to address some of the main...
Bruun, Hans Peter Lomholt; Mortensen, Niels Henrik; Harlou, Ulf
A modular design strategy both enables, but also demands, parallelism in design activities and collaboration between a diversity of disciplines in companies, which often involves supporting computer-based tools for enhancing interaction, design management, and communication. Product data management...... (PDM) and product lifecycle management (PLM) systems offer support by automating and managing some of the operational complexity of modular design activities. PLM system tools are used for handling a variety of product definitions, to manage workflow of development activities, and to measure relational...... properties such as cost and performance. Companies often use a PLM tool for management of CAD files, documents, and drawings, but they do not take advantage of the full potential of the PLM system to support the development activities of modular product designs. The key result of this paper...
Ahmed, Naveed; Jensen, Christian D.
operating systems, by delegating privileges at the identity level. The complexity of classic delegation models, especially if it strictly fol- lows the principle of least privileges, often leads to poor usability which motivates a user to circumvent the default delegation mechanism. On the other hand......Authentication and access control are normally considered separate security concepts that have separate goals and are supported by separate security mechanisms. In most operating systems, however, access control is exclusively based on the identity of the requesting principal, e.g., an access...... control mechanism based on Access Control Lists simply verifies that the authenticated identity of the requesting principal is on the list of authorized users. In this paper we propose a delegation mechanism for nomadic users, which exploits the amalgamation of authentication and access control in most...
Full Text Available The aim of this work is to assess the flexibility of production allowed by extensive production conditions faced with variations in the environment, i.e., market variations and climatic fluctuations, of Limousin beef systems. The study used a case-based methodology in which seven beef farms with less than 1 LU/ha were chosen. Data collection was based on three interviews using a semistructured questionnaire and on the analysis of productive and economic results over a 15-year period (1991-2005. The main evolution of these farms is related to a rise in work productivity associated with an increase in herd size. Herd increase was made possible by enlarging the area, the margin of intensification being limited in these regions. To take advantage of the enlarged land area, females were reared for fattening or for reproduction instead of selling them at weaning. The Limousin female provides a wide product mix because of its plasticity, as has been studied by several researchers. This mix flexibility is achieved by delaying product differentiation, a form of production flexibility that can reduce the risk of under-producing or over-producing varied product configurations. On the other hand, calves sold to the Italian market after weaning are generic products, associated with a flexible production process to overcome fluctuations in forage availability due to climatic variations. The introduction of maize silage for feeding acts as an alternative route, actual and potential, through the system to overcome unexpected forage shortage from natural grasslands as a result of droughts. The study shows that extensive farming systems have developed types of flexibility to match different factors of uncertainty from the environment. Finally, the issue of farm system performance is thus not so much a question of whether a farm is fit at a specific moment in time, but whether it transforms into a less or more sustainable orientation.
Izumo, Mishiroku; Okane, Shougo; Sorita, Takami; Aoyama, Saburou
In production of 20 Ci 99 Mo from 235 U fission, about 120 Ci of radioiodine ( 131 I, 132 I, and 133 I) is involved. To remove airborne radioiodine from the exhaust air from production apparatus and minimize radioiodine release to the atmosphere, the ventilation system is equipped with 2 units of Model-FD charcoal filter (KI 3 -Impregnated charcoal 2 inch thick of Barnebey-Cheney Co.). From September 1976 to December 1977, 21 runs of 99 Mo production involving airborne radioiodine were carried out. The ventilation system was operated continuously for the whole 15 months period; variation in removal efficiency of airborne radioiodine from the exhaust air stream was observed. In the runs valuable experiences were gained in operation and maintenance of the ventilation system including activated charcoal filter and health-physics management of such facility. Following are the results: (1) Airborne radioiodine from 99 Mo production apparatus is reduced to 10 -3 % of the original quantity. (2) When the ventilation system is operated at a maximum air flow rate through the filter, the average efficiency during 15 months is over 98%. (3) Airborne radioiodine released from 99 Mo production apparatus to the ventilation system is less than 5% particulate iodine and alkyl iodines and more than 95% inorganic iodine. (4) Airborne radioiodine released from the stack is less than 28 μCi/run, which is below the limit in regulations on Radioisotope Production Laboratory. (auth.)
Eilers, Hergen; Anderson, Benjamin R.; Gunawidjaja, Ray
Authentication/tamper-indication is required in a wide range of applications, including nuclear materials management and product counterfeit detection. State-of-the-art techniques include reflective particle tags, laser speckle authentication, and birefringent seals. Each of these passive techniques has its own advantages and disadvantages, including the need for complex image comparisons, limited flexibility, sensitivity to environmental conditions, limited functionality, etc. We have developed a new active approach to address some of these short-comings. The use of an active characterization technique adds more flexibility and additional layers of security over current techniques. Our approach uses randomly-distributed nanoparticles embedded in a polymer matrix (tag/seal) which is attached to the item to be secured. A spatial light modulator is used to adjust the wavefront of a laser which interacts with the tag/seal, and a detector is used to monitor this interaction. The interaction can occur in various ways, including transmittance, reflectance, fluorescence, random lasing, etc. For example, at the time of origination, the wavefront-shaped reflectance from a tag/seal can be adjusted to result in a specific pattern (symbol, words, etc.) Any tampering with the tag/seal would results in a disturbance of the random orientation of the nanoparticles and thus distort the reflectance pattern. A holographic waveplate could be inserted into the laser beam for verification. The absence/distortion of the original pattern would then indicate that tampering has occurred. We have tested the tag/seal's and authentication method's tamper-indicating ability using various attack methods, including mechanical, thermal, and chemical attacks, and have verified our material/method's robust tamper-indicating ability.
... system characteristics paired with the standard username and password. Virtual tokens work by sharing the... computer communicates directly with the authenticating Web site, virtual tokens are resistant to ``man-in... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. 2013-5] Authentication of...
S. Santhosh Baboo; K. Gokulraj
Network security is the prevailing and challenging factor in computer communications. Computer security and communication security are interrelated and essential features in the internetworking system. Network security is ascertained by many factors like authentication, authorization, digital signatures, cryptography, steganography etc. Among them authentication is playing an important role in networked communications, where the communicating partners are to be identified each other legit...
Levy, Yair; Ramim, Michelle M.; Furnell, Steven M.; Clarke, Nathan L.
Purpose: Concerns for information security in e-learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e-learners' intention to provide multibiometric data and use of multibiometrics…