Security and authentication in large computing environments

Download
1998
Göktaş, Ahmet Hakan

Suggestions

Security in IP networks and an authentication server design
Şentürk, Muzaffer; Bilgen, Semih; Department of Electrical and Electronics Engineering (1995)
Security analysis of electronic signature applications and test suite study
Ergun, Tamer; Özbudak, Ferruh; Department of Cryptography (2013)
Digital signature technology is used widely for security and trust in electronic business and communications. Nowadays it becomes commonly used especially in government agencies. From this point of view, it is crucial to implement correct applications to create and verify digital signatures. CEN (European Commitee for Standardization) has introduced the security requirements for signature applications but neither proposed a PKI model nor implemented a test suite to evaluate the accuracy of signature applica...
Security and service quality analysis for cluster-based wireless sensor networks
Tomur, Emrah; Erten, Y. Murat (2007-05-25)
In this study, we analyze security and quality of service (QoS) issues in cluster-based wireless sensor networks (WSN). Taking spatial resolution as the main QoS metric and limiting the security definition to data integrity and authentication, we present a control strategy to maintain desired QoS and security levels during the entire operation of a cluster-based sensor network. Besides, our proposed strategy considers some other WSN QoS attributes such as coverage, packet collision and system lifetime. It p...
Security Attacks and Countermeasures in Surveillance Wireless Sensor Networks
Sert, Seyyit Alper; Onur, Ertan; Yazıcı, Adnan (2015-10-16)
Surveillance has always been an important task for human beings either for protecting a precious asset or gathering information from the surrounding environment. However, things to be monitored are increasing with a huge rate due to the changing requirements day by day. As a result, it becomes nearly impossible for individuals to do this task manually. To be able to fulfill such requirements, Surveillance Wireless Sensor Networks (SWSNs) have emerged. An SWSN is comprised of tiny nodes geared with various s...
Security and quality of service for wireless sensor networks
Tomur, Emrah; Bilgen, Semih; Department of Information Systems (2008)
Security and quality of service (QoS) issues in cluster-based wireless sensor networks are investigated. The QoS perspective is mostly at application level consisting of four attributes, which are spatial resolution, coverage, system lifetime and packet loss due to collisions. The addressed security aspects are message integrity and authentication. Under this scope, the interactions between security and service quality are analyzed with particular emphasis on the tradeoff between security and spatial resolu...
Citation Formats
A. H. Göktaş, “Security and authentication in large computing environments,” Middle East Technical University, 1998.