I. Pikrammenos, Chrristos Lampiris, Panagiotis Tolis, Panagiotis Perakis
{"title":"新兴的多功能、个性化安全环境","authors":"I. Pikrammenos, Chrristos Lampiris, Panagiotis Tolis, Panagiotis Perakis","doi":"10.1109/IISA.2019.8900721","DOIUrl":null,"url":null,"abstract":"Secure operational environments are characterized by functional integrity and diversity at the same time, realizing separate spheres of effectiveness. Cooperation of these spheres towards an integrated operational system leaves room for interworking over sphere-specific interfaces and service access points. The interaction among them could overpass the limitations of coupled transactions and their vulnerabilities incorporating a diverse mean of sensitive information handling. This mean could take advantage of the characteristics of Smart Cards, and enhance functionality of the system. A case study of the application of Smart Cards in a WiFi system in order to enhance its operation and leverage its security vulnerability is presented.","PeriodicalId":371385,"journal":{"name":"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Emerging multi-functional, personalized secure environments\",\"authors\":\"I. Pikrammenos, Chrristos Lampiris, Panagiotis Tolis, Panagiotis Perakis\",\"doi\":\"10.1109/IISA.2019.8900721\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secure operational environments are characterized by functional integrity and diversity at the same time, realizing separate spheres of effectiveness. Cooperation of these spheres towards an integrated operational system leaves room for interworking over sphere-specific interfaces and service access points. The interaction among them could overpass the limitations of coupled transactions and their vulnerabilities incorporating a diverse mean of sensitive information handling. This mean could take advantage of the characteristics of Smart Cards, and enhance functionality of the system. A case study of the application of Smart Cards in a WiFi system in order to enhance its operation and leverage its security vulnerability is presented.\",\"PeriodicalId\":371385,\"journal\":{\"name\":\"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IISA.2019.8900721\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IISA.2019.8900721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure operational environments are characterized by functional integrity and diversity at the same time, realizing separate spheres of effectiveness. Cooperation of these spheres towards an integrated operational system leaves room for interworking over sphere-specific interfaces and service access points. The interaction among them could overpass the limitations of coupled transactions and their vulnerabilities incorporating a diverse mean of sensitive information handling. This mean could take advantage of the characteristics of Smart Cards, and enhance functionality of the system. A case study of the application of Smart Cards in a WiFi system in order to enhance its operation and leverage its security vulnerability is presented.