دانلود و نمایش مقالات مرتبط با Certificates::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Certificates

تعداد مقالات یافته شده: 14
ردیف عنوان نوع
1 CREASE: Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy in VANETs
CREASE: طرح احراز هویت مبتنی بر نام مستعار بدون گواهی و استفاده مجدد برای فعال کردن امنیت و حریم خصوصی در VANET-2022
Due to the customers’ growing interest in using various intelligent and connected devices, we are surrounded by the Internet of Things (IoT). It is estimated that the number of IoT devices will exceed 60 billion by 2025. One of the primary reasons for such rapid growth is the Internet of Vehicles (IoV). Internet of Vehicles (IoV) has evolved into an emerging concept in intelligent transportation systems (ITS) that integrates VANETs and the IoT to enhance their capabilities. With the emergence of IoV and the interest shown by customers, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. However, for this to happen, wide participation of vehicle owners in VANET is needed. The primary concerns of vehicle owners to participate in VANET are privacy and security. In this paper, we present a Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy (CREASE) in VANETs. One of the ways to preserve the privacy of vehicles/drivers is to allow vehicles/drivers to use pseudo identities (pseudonyms) instead of their real identities (such as VIN number or driving license number) in all communications. The pseudonym used by a vehicle needs to be changed frequently to prevent the vehicle from being tracked. Our scheme uses Merkle Hash Tree and Modified Merkle Patricia Trie to efficiently store and manage the pseudonyms assigned to a vehicle. This enables a vehicle to pick and use a random pseudonym from a given set of pseudonyms assigned to it as well as change its pseudonym frequently and securely to ensure privacy. Unlike many of the existing schemes, our scheme does not use certificates and certificate revocation lists for authentication. Moreover, it allows vehicles to get a set of pseudonyms only once from the trusted authority. We present a formal proof of correctness of our scheme and also compare our scheme with some of the other contemporary schemes to show the effectiveness of our scheme.
Keywords: VANETs | Intelligent transportation systems | Authentication | Security | Privacy-preserving authentication
مقاله انگلیسی
2 The rise of psychological physicians: The certification of insanity and the teaching of medical psychology
ظهور پزشکان روانشناس: گواهی جنون و آموزش روانشناسی پزشکی-2020
This paper investigates the nexus between the legal provisions for the certification of insanity and the intro- duction of psychological medicine into British medical education. Considering legal and published sources, it shows that the 1853 Lunatic Asylums Act proved fundamental for the promotion of medical psychology as part of medical training. By giving doctors the authority to report “facts of insanity”, this law created the need for “psychological physicians” capable of certifying lunacy. I explore this connection in three sections. First, I introduce the emergence of medical certificates in the context of asylum committal. Second, I focus on the certification procedure introduced in 1853 which required “facts of insanity personally observed”. Third, I consider how British asylum doctors advocated for the diffusion of psychological medicine as an essential university subject for certifying practitioners. This paper emphasizes the relevance of confinement legislation in the development of psychiatry as a medical specialty.
Keywords: Certification | Asylum | Confinement | Education | Expertise | Law
مقاله انگلیسی
3 Considering sustainability in cruise vessel design and construction based on existing sustainability certification systems
با توجه به پایداری در طراحی و ساخت کشتی های کروز بر اساس سیستم های صدور گواهینامه پایداری موجود-2020
Interest towards sustainability in cruise industry has increased during recent years. This article focuses in the ship design and construction phase and what sustainability indicators can be collected e and adapted - from certification systems in other sectors. Certificates in land-based construction and hospitality sectors, as well as a general reporting scheme called Global Reporting Initiative (GRI), serve as a benchmark in this study. The indicators that can be collected already during the design and construction phase are categorized, the categories are linked to the phase in which the indicators have effect on, and the applicability of each category for cruise industry is considered. The certificates for land-based construction are more detailed than GRI and more thorough than certificates in hospitality sector. From the indicators affecting design and construction phase, indicators in general management of the project, material selection and waste management categories can be utilized in cruise industry similarly to existing sustainability systems. While social sustainability is seen important in cruise industry, in land-based construction sector the social sustainability indicators are scarce, whereas GRI or even hospitality sector certificates have more comprehensive set of indicators. In indicators affecting the operation time, modification and additions are required before usage in cruise industry. The environmental effects should be redefined taking into account especially the air pollution and waste management. In well-being effects and encouraging sustainable lifestyle there are plenty of unsuitable indicators due to the operational environment, but new indicators could be developed on the crew premises. Building efficiency and commissioning are suitable for cruise industry. Although there are only a few indicators affecting the deconstruction phase, they can be considered suitable.
Keywords: Sustainability | Cruise industry | Certificate | Indicator
مقاله انگلیسی
4 Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems
برون سپاری مبتنی بر پروکسی مبتنی بر هویت با ممیزی عمومی در سیستم های سایبر فیزیکی پزشکی مبتنی بر ابر-2019
Cloud-based medical cyber–physical system (MCPS) relies on cloud computing to provide powerful data storage and computing services. Based on the vital outsourced medical data, doctors can perform precise medical diagnosis for patients, thus the integrity verification of medical data has become increasingly important. In this paper, we propose an identity-based proxy-oriented outsourcing with public auditing scheme in cloudbased MCPS using elliptic curve cryptography. Our scheme enables a patient to authorize the proxy to generate and upload the signatures of medical data and corresponding encrypted medical data to cloud-based MCPS. Any third party auditor (TPA) can audit the medical data efficiently, without retrieving the entire medical data set. We provide the security proof of the proposed scheme, including the storage correctness guarantee and proxy-oriented privacy-preserving property. Moreover, our scheme is designed on identity-based systems, which can avoid complex certificates management. The efficiency comparison shows that our scheme is much more light-weight, and more suitable in cloud-based MCPS.
Keywords: Cloud computing | Identity-based proxy-oriented outsourcing | Medical cyber–physical system | Elliptic curve cryptography | Public auditing
مقاله انگلیسی
5 Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy
تجزیه و تحلیل دقیق و بهبود ممیزی عمومی مبتنی بر هویت کارآمد و ایمن برای داده های برون سپاری پویا با پروکسی-2019
For data owners of restricted cloud access with a delegated proxy, public auditing technology for cloud data integrity, plays critical roles in ensuring powerful productivity that flexible cloud services provide for their business. In order to address the scalability of data owners and storage clouds for secure public auditing, Yu et al. (2017) proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019), which also overcomes complicated public key certificates management issue. In this article, we figure out that this scheme is vulnerable to data loss attack where clouds could pass integrity auditing without original data. Meanwhile, a threat of system security is demonstrated, i.e., any entities are able to recover proxy private keys and impersonate proxy to forge proxy tag, with two arbitrary data tag pairs of same data owner. To enable secure identity-based batch public auditing with proxy processing, we propose an improved scheme without these security flaws and prove its security under CDH hard problem in the random oracle model. With complexity anal- ysis, our scheme shows better efficiency over identity-based proxy-oriented data uploading and remote data integrity checking in public cloud (ID-PUIC) in a single owner effort on a single cloud. Especially, we give the detailed analysis for how efficiently the attacks on Yu et al.’s scheme could be launched with an experiment, and demonstrate complete reduction on probability and time for proving security of our improved scheme. For potential application in big data storage, we first evaluate the error detection probability varying on number of auditing blocks, and then conduct detailed performance analysis by simulating our scheme and ID-PUIC scheme on the different number of data owners and storage clouds, with up to 10 6 data blocks
Keywords: Cloud storage | Proxy | Public data auditing | Identity-based cryptography | Provable security
مقاله انگلیسی
6 Another look at TLS ecosystems in networked devices vs: Web servers
نگاهی دیگر به اکوسیستم های TLS در دستگاه های تحت شبکه در مقابل سرورهای وب-2019
High-speed IPv4 scanners, such as ZMap, now enable rapid and timely collection of TLS certificates and other security-sensitive parameters. Such large datasets led to the devel- opment of the Censys search interface, facilitating comprehensive analysis of TLS deploy- ments in the wild. Several recent studies analyzed TLS certificates as deployed in web servers. Beyond public web servers, TLS is deployed in many other Internet-connected devices, at home and enterprise environments, cyber physical systems, and at network back- bones. In April 2017, we reported the results of a preliminary analysis based on measure- ment data of TLS deployments in such devices (e.g., routers, modems, NAS, printers, SCADA, and IoT devices in general) collected in Oct. 2016 using Censys. We also compared certificates and TLS connection parameters from a security perspective, as found in common devices against top Alexa sites. Censys has evolved since then and its data volume has increased with the addition of several new device types. In this paper, we perform a similar but more comprehensive measurement study to assess TLS vulnerabilities in devices, and compare our current results with our 2016 findings, showing how such systems have evolved in the last one and half year. Indeed, there are noticeable improvements in the TLS ecosystem for devices, especially in terms of adoption of TLS itself (from 29.4% in 2016 to 73.7% in 2018) and stronger cryptographic primitives. However, we also note the continuity of significant weaknesses in devices for which immediate remediation is warranted (e.g., the use of known private keys, SSLv3, MD5-RSA, and RC4). We have also contacted the top manufacturers of vulnerable devices to convey our findings. Most of them blamed users for not updating their devices with latest firmware images that apparently would mitigate the reported findings.
Keywords:CPS | IoT | SCADA | TLS | Certificates | Cryptographic primitives
مقاله انگلیسی
7 Lightweight and escrow-less authenticated key agreement for the internet of things
قرارداد کلیدی معتبر سبک و بدون اعتبار برای اینترنت اشیاء -2017
Security is essential for wide wireless sensor network (WSN) deployments, such as the Internet of Things (IoT). However, the resource-constrained nature of sensors severely restricts the cryptographic algorithms and protocols that can be used in such platforms. Such restrictions apply especially to authenticated key agreement (AKA) protocols for bootstrapping keys between authorized nodes: in traditional net works, such schemes involve the transmission of quite large certificates and the execution of memory and processing-intensive cryptographic algorithms, which are not suitable for WSNs. Whereas lightweight WSN-oriented schemes also exist, most of them focus on small deployments where key-escrow is possible (i.e., a fully trusted authority knows the private keys of all nodes). Aiming to identify AKA solutions suit able for the IoT scenario, in this article we assess lightweight and escrow-free schemes, evaluating their security and performance in terms of processing time and energy consumption in the TelosB platform. Besides proving that some very efficient schemes are actually flawed, we show that the combination of SMQV (strengthened-Menezes-Qu-Vanstone) with implicit certificates leads to a secure and lightweight AKA scheme.
Keywords: Security | Authenticated key agreement | Sensor networks | Internet of things
مقاله انگلیسی
8 Distributed controllers multi-granularity security communication mechanism for software-defined networking
کنترل کننده های توزیع کننده مکانیسم ارتباطات امنیتی چند منظوره برای شبکه های تعریف شده توسط نرم افزار-2017
For the multi-domain software defined network (SDN), different controllers are not able to directly communicate with each other due to the different distances among control planes. Therefore, the exchange of information among different domains is generally unsecure. The main contribution of this paper can be summarized into two parts. Firstly, architecture of multi-granularity security controller is proposed, which includes a basic control module and a multi-granularity security customized module. Secondly, a secure communication mechanism is proposed for distributed controller, where a prototype of this mechanism is implemented. In particular, this mechanism can make use of the border switch as inter domain agents, where special packets are used by the controller to send messages to the secure tunnel. A two-step authentication of the controller can be provided by inter-domain agents and digital certificates. The experimental results demonstrate that the distributed controller secure communication mechanism is capable of effectively improving the secu rity of SDN domain.
Keywords: Software defined network | Security architecture | Secure communication
مقاله انگلیسی
9 گردشگری روغن زیتون: ارتقای توسعه روستایی در اندلس (اسپانیا)
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 33
غذاهای دارای گواهی کیفیت، هرچه بیشتر درحال به دست آوردن جایگاه در رژیم غذایی مردم هستند. هر روز بیش از یک تقاضا برای بازدید از تاسیسات تولید جهت یاد گرفتن اینکه چگونه محصولات غذایی ساخته می شوند و برای نمونه گیری از آنها، وجود دارد. این محصولات شامل روغن زیتون می شود، یک محصول نمونه از اسپانیا (اسپانیای جنوبی). هدف این مطالعه تحلیل این است که گردشگری روغن زیتون چه چیزی باید در این منطقه ارائه دهد. یک ارزیابی روی شرکتهای تولید مواد غذایی روغن زیتون و اسم و منشأ اصلی آنها به منظور تعیین درجه دخیل بودن آنها در توسعه محصول گردشگری در "گردشگری روغن زیتون" انجام شد. سهم اصلی این مطالعه این است که اولین تحلیل روی منشأ چندین شرکت روغن زیتون از سراسر اسپانیا می باشد و به دنبال هم افزایی با دیگر جریان های غذایی در منطقه می باشد که می تواند تقاضاهای بازدید کنندگان و همچنین سطح توسعه و ثروت را در این ناحیه افزایش دهد.
کلیدواژه ها: گردشگری روغن | توسعه روستایی | نشان محفوظ اصل | آشپزی | اسپانیا | برداشت های گردشگر
مقاله ترجمه شده
10 Exploring the Information Asymmetric factors of Pledges of Warehouse Certificates Based on Internet of Things
بررسی عوامل نامتقارن اطلاعات تعهد گواهی انبار داده ها بر اساس اینترنت اشیاء -2017
In internet plus era, the establishment of information platform is the way to solve the problem of asymmetric way. However Internet plus should not focus on the Internet as a tool to solve the problem, but on the nature of the problem to be solved. The nature of information sharing platform of pledges of warehouse certificates is to strengthen supervision and improve management. Study on the influence factors to construct the system information is the premise of constructing information sharing platform. The paper researches the factors that cause asymmetry information in the process of pledges of warehouse certificates business with the use of exploratory factor analysis on collecting questionnaires which was designed about asymmetry information of pledges of warehouse certificates based on the literature analysis and expert investigation. The research shows, there are four kinds of factors which cause information asymmetry in the process of pledges of warehouse certificates business. They are about the pledged goods, financing of enterprises, administrative agencies, and other warehouse receipt pledge business social agencies.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 1193 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 1193 :::::::: افراد آنلاین: 46