I. Pikrammenos, Chrristos Lampiris, Panagiotis Tolis, Panagiotis Perakis
{"title":"Emerging multi-functional, personalized secure environments","authors":"I. Pikrammenos, Chrristos Lampiris, Panagiotis Tolis, Panagiotis Perakis","doi":"10.1109/IISA.2019.8900721","DOIUrl":null,"url":null,"abstract":"Secure operational environments are characterized by functional integrity and diversity at the same time, realizing separate spheres of effectiveness. Cooperation of these spheres towards an integrated operational system leaves room for interworking over sphere-specific interfaces and service access points. The interaction among them could overpass the limitations of coupled transactions and their vulnerabilities incorporating a diverse mean of sensitive information handling. This mean could take advantage of the characteristics of Smart Cards, and enhance functionality of the system. A case study of the application of Smart Cards in a WiFi system in order to enhance its operation and leverage its security vulnerability is presented.","PeriodicalId":371385,"journal":{"name":"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IISA.2019.8900721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Secure operational environments are characterized by functional integrity and diversity at the same time, realizing separate spheres of effectiveness. Cooperation of these spheres towards an integrated operational system leaves room for interworking over sphere-specific interfaces and service access points. The interaction among them could overpass the limitations of coupled transactions and their vulnerabilities incorporating a diverse mean of sensitive information handling. This mean could take advantage of the characteristics of Smart Cards, and enhance functionality of the system. A case study of the application of Smart Cards in a WiFi system in order to enhance its operation and leverage its security vulnerability is presented.