Paper
28 September 2016 Modeling adaptive non-repudiation security services
Marcin A. Tunia
Author Affiliations +
Proceedings Volume 10031, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2016; 100314I (2016) https://doi.org/10.1117/12.2248916
Event: Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2016, 2016, Wilga, Poland
Abstract
Non-repudiation security service helps to protect an electronic system against false denial of performing certain actions by the participants of communication involving that system. In the development process of such a security service it is important to implement all the necessary elements and adapt them in accordance with the defined protection scope. There are several types of non-repudiation and cases of their use. In this paper the author focuses on the situation when a nonrepudiation service is being implemented on an application server. All necessary actions of the users i.e. of people and/or machines are recorded by the service. Currently a new type of security services called “context-aware security services” is under studies. This type of service involves acquiring and processing additional information in order to provide flexible protection. This paper presents the elements of non-repudiation security service and how the elements can be modeled with context awareness support including reputation systems.
© (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Marcin A. Tunia "Modeling adaptive non-repudiation security services", Proc. SPIE 10031, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2016, 100314I (28 September 2016); https://doi.org/10.1117/12.2248916
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Computer security

Databases

Data acquisition

Systems modeling

Telecommunications

Network security

Back to Top