Mobile Medical Records. Project Proposal

Size: px
Start display at page:

Download "Mobile Medical Records. Project Proposal"

Transcription

1 Mobile Medical Records Project Proposal Paul Brittan Shelley-Ann Petzer

2 Table of Contents 1. Project Description Problem Statement Research Aims The performance comparisons of encryption algorithms The performance comparisons of compression algorithms Comparison of storing medical records on the internal memory of the cell phone as opposed to a microsd card The transmission medium between the cell phone and a medical database The importance of the problem Procedures and methods Development environment System design Implementation strategy Expected challenges Performance testing Ethical, professional and legal issues Related Work Anticipated Outcomes System Expected impact Key success factors Project Plan Risks Timeline Required resources Deliverables Milestones Work allocation References Appendix A

3 1. Project Description The project aims to investigate the storage of medical records on cell phones. The original idea for this project was proposed by Simelela, an NGO dealing with rape victims, in which the aim was to aid these victims with revealing certain medical information when reporting their case by storing their medical records on a cell phone. Over and above this, patients in developing countries are often responsible for storing and transporting their own paper-based medical records, which can lead to a loss or damage of these documents. Therefore storing these records on a cell phone will make the process more convenient for both patients and medical practitioners. When developing applications for cell phones, it is important to be aware of and deal with the restrictions on the capabilities of these devices [Burgsteiner and Prietl 2008]. In particular the focus will be on encrypting and compressing the medical records for storage on a cell phone as well as for transmission to and from a medical database. This will be done by implementing various compression and encryption algorithms and comparing their performance when executed on a cell phone. 2. Problem Statement Cell phones are becoming ubiquitous and their use for storing documents and running applications that would usually be done on a desktop computer is increasing. This is also observed particularly in developing areas where access to more advanced technology is limited. A cell phone is therefore the perfect tool in terms of its diversity for creating an application that allows a patient to store and manage their own medical records. However cell phones create issues when it comes to ensuring the privacy of the medical record as well as challenges related to the resources limitations. In order to understand and overcome the issues surrounding the concept of mobile medical records, specific research questions will need to be addressed. 2.1 Research Aims The two major research aims that this project will be addressing involve the performance comparisons of both compression and encryption algorithms The performance comparisons of encryption algorithms Due to the limitations of a cell phone, it is important to analyse the performance of the encryption algorithms in order to find the most suitable choice for securing a medical record on a cell phone. This will involve the analysis of several algorithms in order to find an algorithm that maximises the security that it provides whilst minimising the resources required by the cell phone The performance comparisons of compression algorithms Similarly with compression algorithms, the most suitable choice for compressing a medical record on a cell phone must be found. This will involve the analysis of several algorithms in order to find an algorithm that reduces the storage space required by the cell phone whilst minimising the resources that it requires Granularity of the medical records Patients need to have control that will allow them to selectively show only parts of their medical record at any given time. The medical record will therefore need to be broken up into separate components to allow for partial access before compression and encryption can take place. 2

4 2.1.4 Comparison of storing medical records on the internal memory of the cell phone as opposed to a microsd card Medical records and other personal information need to be stored within the limited resources of cell phones. Ideally the records should be stored on the internal memory of the cell phone. This way the records can t easily be transferred from one phone to another without the user s knowledge and can only be accessed by someone with the correct permission. For the medical records to be stored in internal memory, they would need to undergo a series of lossless data compressions so that they can be stored within the limited storage space available on cell phones. These compressions are computationally intensive [Barr and Asanovic 2006] and may exceed the processing power on standard cell phones. Research will need to be conducted in order to see if using internal memory is a feasible option. If internal memory storage is not successful, another approach will be to investigate storing the records on a mircosd card in the cell phone. With the advances in mobile technology, the available memory on mircosd cards is sufficient for storing the records at a low cost The transmission medium between the cell phone and a medical database The medical record will need to be transmitted between the cell phone and a medical database to ensure that the record remains up to date and to allow the medical practitioner to gain access to the record. The aim is to investigate the strengths and weaknesses of using both Bluetooth technology and wireless networks for transmission. Bluetooth would be ideal since it is a much more accessible technology. It is also highly unlikely that a clinic in a developing area would have access to a wireless network. However research will need to be conducted in order to determine if Bluetooth is a feasible means of transmitting sensitive data such as medical records. 2.2 The importance of the problem This problem is important since the provision of mobile medical records, particularly in developing countries, will alleviate the problem of paper-based records. It will also create a convenient means for patients to have full control over their records as well as be able to easily share their medical record with medical practitioners. The treatment of certain diseases requires a patient's full medical history and therefore there exists a need for efficiently storing and retrieving such information so that medical practitioners can make accurate diagnoses. The medical record must also remain private and it is therefore important to determine the performance of different encryption algorithms so that the best security solution can be provided within the limitations of the cell phone. Similarly, the compression of the medical record is important since it is destined to grow over time and needs to be stored within the limited memory that is available on a cell phone. Therefore measuring the performance of different compression and encryption algorithms is also important. Reporting the findings for these performance tests will also aid in other research areas where such performance measurements are relevant. 3

5 3. Procedures and methods 3.1 Development environment The system will be implemented on mid-tier cell phones such as the Symbian S40 and Samsung e250. This type of device was selected for the reason that the application will mainly be deployed in developing areas where there is a low income rate. These devices are affordable and provide the needed specifications to run the complex encryption and compression algorithms that are necessary. For programming the application we will be using J2ME, which allows us to use Java and the J2ME wireless toolkit to create our application for mobile devices. 3.2 System design The system was designed to have two separate components. The first part deals with security and involves securing the transmissions between the medical database server and the cell phone. This will also involve encrypting and decrypting the data on the cell phone. This part of the project is highlighted green in the figure below. The second component involves compressing and decompressing the records on the cell phone and then efficiently storing these records in memory. This part of the project is highlighted blue in the figure below. The components are designed to be as separate as possible and therefore linked only by data that is passed between them. Figure 1. The system diagram displays the separate components of the project that will be implemented by the group members. 4

6 3.3 Implementation strategy Since the components for this project are separate we will work on implementing each component as a stand-alone function. For security, the first step will be to find an optimal encryption algorithm that can be executed on a cell phone. This will then be used to encrypt and decrypt the medical record data. The next step will then be to secure the transmission of data between the cell phone and the medical database. With regard to the compression component, the first step is finding a compression algorithm that provides lossless data compression within the limited resources on a cell phone. The next step would then be to develop this component to be able to compress the medical record data on a cell phone. After the two stand-alone functions have been created and tested, we will integrate the two components together into one application for final testing. The interface for the system will be rudimentary and primarily for testing purposes since the main aim of the project is to investigate a back-end solution. 3.4 Expected challenges A major challenge for this project will be creating reasonable goals. Being new to the field it is going to be a challenge estimating how long certain tasks are going to take. This may result in the underestimation of the complexity of certain tasks and therefore fewer days than what is needed being assigned to complete the tasks. This will cause the project to fall behind schedule. One of the main goals for this project is testing the performance of our application on different types of cell phones. The challenge we have due to using mid-tier mobile phones is that there is no simple application to monitor system performance which means we need to devise a way of monitoring the resource usage of the phone when running the application. This project will involve complex algorithms for both encryption and compression systems therefore another challenge will involve understanding the concepts behind these algorithms in order to find the most efficient algorithm given the limitations of a cell phone. 3.5 Performance testing The performance of the encryption algorithms will be analysed according to the level of security that they provide in comparison with their use of the resources on the cell phone. Similarly, the performance of the compression algorithms will be analysed according to their ability to reduce the size of the data without the loss of any detail in comparison with their use of the resources on the cell phone. Ideally we would like to obtain measurements that will be used to compare the performance of each algorithm. Measurements such as: Execution time CPU usage Memory usage But as mentioned in section 3.4, there is no simple application to monitor the system. We can monitor the execution time by printing out the system s start and finish time to a log file. In order to be able to test the performance of our application we plan on implementing something similar to what was done in [Wang and Manner 2009], in which we will monitor the voltage level of the battery to determine how much power is used in running our application. 5

7 The purpose of this will be to determine how much power went to processor to complete the task by measuring the amount of power that was lost in the battery. Less battery usage implies that the processor ran for a shorter amount of time and since the cell phones will have similar specifications, we can then compare the results. The algorithms will also be tested using different data block sizes in order to determine the rate at which the performance of the algorithms changes as the size of the data increases. After the algorithms have been sufficiently tested, as an extension we aim to investigate the performance of the software on different cell phones. The aim here would be to compare different phones with the same specifications as well as different memory card types in order to see if our application yields different results on different hardware. 4. Ethical, professional and legal issues Our project will not require ethics clearance as we will not be performing user based testing. There are legal and ethical issues associated with the use of real medical record data since this must remain confidential. In order to overcome these issues we will be using anonymised medical record data that will be obtained from postgraduate students who are currently doing research in this field. These records will be used for the purposes of developing the system and testing the performance of various encryption and compression algorithms. In terms of intellectual property rights, the results from the research and performance measures will be released under an open source licence so that other researchers are able to benefit from the findings. 6

8 5. Related Work Recently it has been demonstrated that in terms of public key cryptography, the elliptical curve cryptography (ECC) algorithm not only requires less computational power but also provides security that is comparable to the Rivest, Shimar and Alder (RSA) algorithm [Misic 2008]. The secret with ECC lies in the computational complexity with which the keys are generated thus making it more challenging to break the algorithm even though the size of the keys are smaller compared to the keys used for RSA. The Advanced Encryption Standard (AES) algorithm has been shown to require only a small amount of computational power whilst providing a secure means of encryption compared to other symmetric key cryptography algorithms [Lisonek and Drahanský 2008]. A recent performance evaluation of several symmetric encryption algorithms conducted by [Elminaam et al. 2010] shows that the Blowfish algorithm outperforms all the rest including the AES algorithm. The performance tests were conducted to analyse both throughput and time consumption for each algorithm on various file types and sizes. Lossless data compression applications can fail when compressing certain files, if the application struggles to find a repeated pattern [Wang and Manner 2009]. The figure below shows the compression ratio and the time it takes to compress a file that already has a compact format. Figure 2. Comparison of different compression programs with corresponding compression times [Wang and Manner 2009]. 6. Anticipated Outcomes 6.1 System At the end of the project we expect to have created an application that will allow for the storage, management and maintenance of medical records. The system will be capable of storing a compressed and encrypted medical record on a cell phone as well as transmitting the medical record securely between a cell phone and a medical database. 7

9 6.2 Expected impact The expected results for this project will consist of a system that is able to securely store a medical record on a cell phone. The system will also allow the medical record to be securely transmitted between the cell phone and a medical database. Since the main research component consists of comparing the performance of both encryption and compression algorithms, we expect to find a combination of these algorithms that is most efficient and cost effective for implementation on a cell phone. Since this is an important problem and will aid in the management of medical records, the system will make a difference to patients in developing areas that are currently responsible for managing their own medical records. The project will also have an impact on the lives of medical practitioners working in clinics that are in developing areas as they will be able to make more accurate diagnoses if the patient s medical records are up to date and well managed. Another important outcome of this project will be a report of the findings in terms of performance for both encryption and compression algorithms that could be used for future research purposes. 6.3 Key success factors The success of the project will be judged by the three components. Firstly, the ability to store the medical record on the cell phone using the best possible medium of storage, whether it be using microsd cards or the internal memory of a cell phone. Secondly, to create a prototype that efficiently encrypts and compresses the medical records on the mobile phone within the limited resources available and finally, to secure the transmission between the medical database and the patient s cell phone that is both efficient and cost effective. 7. Project Plan 7.1 Risks Failure to meet project milestones If this becomes a regular occurrence it is likely that the project will not meet the necessary requirements and end up being a failure. Severity: High Likelihood: Medium Mitigation: Milestones must be monitored on a weekly basis to ensure that the project does not fall behind schedule. Meetings with the supervisor to present work that has been completed will help to keep the project on track. In the event that the project falls behind schedule, both members of the team will need to do extra work to gain lost time. Hardware failure Since the core of the project involves the use of a cell phone, if the device fails then this could result in delays for both implementation and performance testing. Severity: High Likelihood: Medium Mitigation: The project will require another cell phone as a backup device in the event that the original device fails. The cell phone will need to be the same as the original device to maintain the consistency of the implementation and performance testing thus far. 8

10 Group member becomes unavailable In the event that one of the team members becomes unavailable to the project, this could result in failure to meet the project milestones and ultimately result in the project falling behind schedule. Severity: High Likelihood: Low Mitigation: The project has been designed in such a way that each group member has been allocated a separate area of research and implementation. The separation of the project will allow one group member to continue on with their work should the other group member become unavailable. Failure to find a means of measuring performance This is one of the major research aims for this project and therefore failure to find an effective means of testing the performance of different compression and encryption algorithms could cause the scope of the project to change. Severity: High Likelihood: Medium Mitigation: A paper detailing a way of monitoring battery usage during compression that was found can aid us in adopting a similar technique to measure performance if all else fails. Further research will therefore need to be conducted in this area. 7.2 Timeline Refer to the Gantt Chart in Appendix A. 7.3 Required resources Equipment Cell phones: At least two cell phones will be required in the event that one of them fails and at least two different types of cell phone for performance testing purposes. MicroSD cards: These will be used to determine the best possible storage medium along with the internal memory on the cell phone. Bluetooth USB device: This will be required to test the transmission of the medical record from the cell phone to the medical database. A device is needed as the existence of Bluetooth on a desktop computer is not guaranteed. Medical database: A database containing anonymised medical record data will be required. Software Java J2ME: This will be used for developing the prototype on the cell phone. 9

11 7.4 Deliverables The following table details the deliverables for the project: Table 1. Project Deliverables Prototype: Initial feasibility demonstration Background/Theory Chapter Design Chapter First implementation Final implementation Chapters on implementation and testing Outline of complete report First complete draft of report Final report handin Poster Project web page Individual reflection paper July 29 July 29 August 19 September 28 September 03 October 10 October 24 October 31 October 03 November 07 November 11 November 10

12 7.5 Milestones The following table details the milestones for the project: Table 2. Project Milestones Milestone Due date Project Proposal 19 May Presentation of project proposal 26 May Project web presence (including proposal, timeline, plan) 14 June Prototype: Initial Feasibility Demonstration 25 July Background chapter done 29 July Design chapter done 29 August First implementation of algorithms and performance testing with write up 19 September Final implementation and performance testing with write up 28 September Final implementation and coding complete 03 October Chapters on implementation and performance testing 03 October Report outline: chapter and major section headings 10 October Final report draft 24 October Report final handin 31 October Poster due 03 November Final Project web page 07 November Individual reflection paper 11 November Final project presentation November 11

13 7.6 Work allocation Each group member has a separate section of the overall workload allocated to them. Paul Brittan will be implementing the storage of the medical record on the cell phone as well as investigating and reporting on the performance of various compression algorithms. Shelley Petzer will be implementing the two way transmission of the medical record between the medical database and the cell phone as well as investigating and reporting on the performance of various encryption algorithms. 12

14 References BARR, K, C. AND ASANOVIC, K Energy-Aware Lossless Data Compression. In ACM Transactions on Computer Systems, 24 (3), ACM New York, NY, USA, BURGSTEINER, H., AND PRIETL, J A Framework for Secure Communication of Mobile E- health applications. In Medical Informatics meets ehealth, ELMINAAM, D. S. A., KADER, H. M. A., AND HADHOUD, M. M Evaluating The Performance of Symmetric Encryption Algorithms. In International Journal of Network Security, 10 (3), ELMUFTI, K., WEERASINGHE, D., RAJARAJAN, M., RAKOCEVIC, V., AND KHAN, S Privacy in Mobile Web Services ehealth. In Proceedings of Pervasive Health Conference and Workshops 2006, 1-6. LISONEK, D. AND DRAHANSKÝ, M SMS Encryption for Mobile Communication. In SECTECH '08: Proceedings of the 2008 International Conference on Security Technology, IEEE Computer Society, Washington, DC, USA, MISIC, J Traffic and Energy Consumption of an IEEE network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange. In Computer Networks Journal, 52 (11), WANG, L., AND MANNER, J Evaluation of data compression for energy-aware communication in mobile networks. In CyberC '09: Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, IEEE Press,

15 Appendix A The following is a Gantt chart for the project. Figure 3. Gantt Chart Paul Brittan Shelley Petzer Both 14

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

Administration Guide. Wireless software upgrades

Administration Guide. Wireless software upgrades Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

Compressing Medical Records for Storage on a Low-End Mobile Phone

Compressing Medical Records for Storage on a Low-End Mobile Phone Honours Project Report Compressing Medical Records for Storage on a Low-End Mobile Phone Paul Brittan pbrittan@cs.uct.ac.za Supervised By: Sonia Berman, Gary Marsden & Anne Kayem Category Min Max Chosen

More information

SCREAM (SCRUM TEAM MANAGEMENT TOOL)

SCREAM (SCRUM TEAM MANAGEMENT TOOL) SCREAM (SCRUM TEAM MANAGEMENT TOOL) HONOURS PROJECT PROPOSAL 2010 COMPUTER SCIENCE UNIVERSITY OF CAPE TOWN Christopher Jolly Bryan (Cliff) Siyam Alexander Kivaisi cjolly@cs.uct.ac.za bsiyam@cs.uct.ac.za

More information

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306 Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project

More information

Lightweight Cryptography. Lappeenranta University of Technology

Lightweight Cryptography. Lappeenranta University of Technology Lightweight Cryptography Dr Pekka Jäppinen Lappeenranta University of Technology Outline Background What is lightweight Metrics Chip area Performance Implementation tradeoffs Current situation Conclusions

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching 1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page

More information

A Study of New Trends in Blowfish Algorithm

A Study of New Trends in Blowfish Algorithm A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department

More information

University of Bristol. Research Data Storage Facility (the Facility) Policy Procedures and FAQs

University of Bristol. Research Data Storage Facility (the Facility) Policy Procedures and FAQs University of Bristol Research Data Storage Facility (the Facility) Policy Procedures and FAQs This FAQs should be read in conjunction with the RDSF usage FAQs - https://www.acrc.bris.ac.uk/acrc/rdsf-faqs.html

More information

WAITER: A Wearable Personal Healthcare and Emergency Aid System

WAITER: A Wearable Personal Healthcare and Emergency Aid System Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Alliance AES Key Management

Alliance AES Key Management Alliance AES Key Management Solution Brief www.patownsend.com Patrick Townsend Security Solutions Criteria for selecting a key management solution for the System i Key Management is as important to your

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Encryption Policy Version 3.0

Encryption Policy Version 3.0 Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Installation and usage of SSL certificates: Your guide to getting it right

Installation and usage of SSL certificates: Your guide to getting it right Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

AfriMeet: An Internet meeting tool designed for low. bandwidth and unstable network conditions

AfriMeet: An Internet meeting tool designed for low. bandwidth and unstable network conditions AfriMeet: An Internet meeting tool designed for low bandwidth and unstable network conditions Tresor Mvumbi, Zafika Manzi, Flora Kundaeli Supervised by Hussein Suleman Department of Computer Science University

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Industrial IOT Gateway Family Datasheet

Industrial IOT Gateway Family Datasheet Industrial IOT Gateway Family Datasheet GW-Series Overview Samsara IoT gateways securely connect sensor data to the Samsara cloud. All models include WiFi and built-in cellular connectivity, storage, and

More information

1) No configuration is necessary in ZDMC nor in RescueNet Field Data Configuration.

1) No configuration is necessary in ZDMC nor in RescueNet Field Data Configuration. The intent of this document is to provide the reader with the following information pertaining to uploading case files from the X Series to TabletPCR and: General Safety Tips regarding the setup and uploading

More information

Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery

Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery WHITE PAPER Cost-Efficient SSL Application Delivery Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery Always On SSL Since 1994, enterprises looking to protect the security

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

Data Deduplication: An Essential Component of your Data Protection Strategy

Data Deduplication: An Essential Component of your Data Protection Strategy WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING

More information

SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD

SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD The Project Team AGENDA Introduction to cloud storage. Traditional backup solutions problems. Objectives of

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

SPINS: Security Protocols for Sensor Networks

SPINS: Security Protocols for Sensor Networks SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California

More information

Depiction of Body Area Network in Cloud Environment

Depiction of Body Area Network in Cloud Environment I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe. MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information

More information

Breach Notification Policy

Breach Notification Policy 1. Breach Notification Team. Breach Notification Policy Ferris State University ( Ferris State ), a hybrid entity with health care components, has established a Breach Notification Team, which consists

More information

SECURITY IN LOW RESOURCE ENVIRONMENTS

SECURITY IN LOW RESOURCE ENVIRONMENTS SECURITY IN LOW RESOURCE ENVIRONMENTS SECURERF WHITE PAPER The discovery of a decades old technology is now promoted by many as the Next Big Thing. This discovery, Radio Frequency Identification (RFID),

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

Capacity Plan. Template. Version X.x October 11, 2012

Capacity Plan. Template. Version X.x October 11, 2012 Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business

More information

Technical White Paper BlackBerry Security

Technical White Paper BlackBerry Security Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...

More information

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and

More information

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile Reform PDC Document Workflow Solution Streamline capture and distribution intuitive lexible mobile Reform PDC Innovation and convenience to maximize efficiency. Your organization is unique so is its document

More information

Cryptography & Digital Signatures

Cryptography & Digital Signatures Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.

More information

Wireless ATA: A New Data Transport Protocol for Wireless Storage

Wireless ATA: A New Data Transport Protocol for Wireless Storage Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

FINAL YEAR PROJECT PROPOSAL Public Voting System

FINAL YEAR PROJECT PROPOSAL Public Voting System FINAL YEAR PROJECT PROPOSAL Public Voting System Nick Day n.day@lancaster.ac.uk Supervisor: Dr Corina Sas ABSTRACT This report presents a proposal for a public voting system to be developed as part of

More information

Email Privacy. Protecting Your Members. Monday, June 30, 2008 3:00 p.m. - 4:15 p.m. Dena Bauckman, Director of Product Management Zix Corporation

Email Privacy. Protecting Your Members. Monday, June 30, 2008 3:00 p.m. - 4:15 p.m. Dena Bauckman, Director of Product Management Zix Corporation What We LEARN in Vegas... Comes Home from Vegas! Email Privacy Protecting Your Members Monday, June 30, 2008 3:00 p.m. - 4:15 p.m. Dena Bauckman, Director of Product Management Zix Corporation Massachusetts

More information

EDA385 Embedded Systems Design. Advanced Course

EDA385 Embedded Systems Design. Advanced Course EDA385 Embedded Systems Design. Advanced Course Encryption for Embedded Systems Supervised by Flavius Gruian Submitted by Ahmed Mohammed Youssef (aso10ayo) Mohammed Shaaban Ibraheem Ali (aso10mib) Orges

More information

A Study on the Security of RFID with Enhancing Privacy Protection

A Study on the Security of RFID with Enhancing Privacy Protection A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890

Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890 Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890 Why are Elliptic Curves used in Cryptography? The answer to this question is the following: 1) Elliptic Curves provide security equivalent

More information

Mobile multifactor security

Mobile multifactor security Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

Instructions on TLS/SSL Certificates on Yealink Phones

Instructions on TLS/SSL Certificates on Yealink Phones Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as

More information

Special Properties of Ad-hoc Wireless Network and Security Models

Special Properties of Ad-hoc Wireless Network and Security Models Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of

More information

mcard CPK Supported Solutions

mcard CPK Supported Solutions mcard CPK Supported Solutions Century Longmai White Paper All rights reserved Contents 1. MTOKEN CPK CARD INTRODUCTION... 2 PRODUCT INTRODUCTION... 2 Product appearance... 3 Hardware parameters... 4 2.

More information

Logitech Advanced 2.4 GHz Technology

Logitech Advanced 2.4 GHz Technology Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012

Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012 Securing Your Sensitive Data with EKM & TDE on SQL Server 2008/2012 About The Speaker Founder & CEO of Townsend Security Leading data security expert 30 years IT industry experience Introduction Organizations

More information

QoS-aware cross-layer communication for Mobile Web services with the WS-QoS framework Abstract: 1 Introduction 2 Related Work

QoS-aware cross-layer communication for Mobile Web services with the WS-QoS framework Abstract: 1 Introduction 2 Related Work QoS-aware cross-layer communication for Mobile Web services with the WS-QoS framework M. Tian, A. Gramm, H. Ritter, J. Schiller, and T. Voigt* Freie Universität Berlin, Institut für Informatik {tian, gramm,

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Managing Mobile Devices Over Cellular Data Networks

Managing Mobile Devices Over Cellular Data Networks Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR

More information

Software as a Service (SaaS) ethical issues

Software as a Service (SaaS) ethical issues Software as a Service (SaaS) ethical issues Marco Vallini marco.vallini@polito.it May 2009 1 Contents 1 Introduction 3 2 Scenario 3 3 Which actors are involved in SaaS? 4 3.1 Traditional software model............................

More information

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies Alaa_hamami@yahoo.com Dr. Mohammad Alaa Al-

More information

Security Sensor Network. Biswajit panja

Security Sensor Network. Biswajit panja Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks

More information

Int. J. Advanced Networking and Applications 1503 Volume:04 Issue:01 Pages:1503-1508 (2012) ISSN : 0975-0290

Int. J. Advanced Networking and Applications 1503 Volume:04 Issue:01 Pages:1503-1508 (2012) ISSN : 0975-0290 Int. J. Advanced Networking and Applications 1503 Accessing a Network using a Secure Android Application Padmalatha Ragunathan Dept of Information Technology, Amrita School of Engineering, Coimbatore,

More information

A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr*

A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr* A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL Rainer Steffen, Rudi Knorr* Abstract Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios.

More information

MITRE Baseline Configuration System Implementation Plan

MITRE Baseline Configuration System Implementation Plan MITRE Baseline Configuration System Implementation Plan FINAL REVISION, October 8, 2008 Purdue University, CS 307, Fall 2008 Team MITRE: Catherine Brown Michael Dunn Mark Nowicki David Tittle TABLE OF

More information

Best practices for protecting network data

Best practices for protecting network data Best practices for protecting network data A company s value at risk The biggest risk to network security is underestimating the threat to network security. Recent security breaches have proven that much

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

A Comparison of Protocols for Device Management and Software Updates

A Comparison of Protocols for Device Management and Software Updates B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering

More information

Remote Network Accelerator

Remote Network Accelerator Remote Network Accelerator Evaluation Guide LapLink Software 10210 NE Points Drive Kirkland, WA 98033 Tel: (425) 952-6000 www.laplink.com LapLink Remote Network Accelerator Evaluation Guide Page 1 of 19

More information

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

Packet Level Authentication Overview

Packet Level Authentication Overview Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,

More information

University of Cyprus

University of Cyprus University of Cyprus Computer Science Department Data Management for Mobile Computing Introduction 1 Introduction = Mobile or nomadic computing = Wireless = Ubiquitous = Personal Architecture 2 Key Issues:

More information

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

CrashPlan Security SECURITY CONTEXT TECHNOLOGY TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Encryption: Ensuring Information Security

Encryption: Ensuring Information Security Encryption: Ensuring Information Security Colin Chisholm CISSP, GCIH Information Security Analyst Associate Information Security & Systems / Compliance cchisholm@northwestern.edu Agenda Encryption - Explanation

More information

Project management. Organising, planning and scheduling software projects. Ian Sommerville 2000 Software Engineering, 6th edition.

Project management. Organising, planning and scheduling software projects. Ian Sommerville 2000 Software Engineering, 6th edition. Project management Organising, planning and scheduling software projects Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 4 Slide 1 Objectives To introduce software project management and

More information

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit

Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit Marc D. Goldstone Vice President and Associate General Counsel Community Health Systems Gerald Jud E. DeLoss Gray Plant

More information