Skip to main content

2016 | OriginalPaper | Buchkapitel

Security Applications Using Puzzle and Other Intelligent Methods

verfasst von : Vladimir Jotsov, Vassil Sgurev

Erschienen in: Novel Applications of Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

New types of constraints are considered. Reasons are described that lead to applications of intelligent, logic-based methods aiming at reduction of risk factors to ATMs. Special attention is paid to applications of Puzzle method in ATMs. To make a more independently functioning ATM, the proposed methods should be applied to data/knowledge/metaknowledge elicitation, knowledge refinement, analysis of different logical connections aiming at information checks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat V. Jotsov, Intelligent information security systems. Sofia: Za Bukvite – O Pismeneh Publ. House (2010), 278 p V. Jotsov, Intelligent information security systems. Sofia: Za Bukvite – O Pismeneh Publ. House (2010), 278 p
7.
Zurück zum Zitat S. Dhurandher et al., Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation, in Proceedings of the 14th Communications and Networking Symposium, San Diego, CA, USA (2011), pp. 5–10 S. Dhurandher et al., Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation, in Proceedings of the 14th Communications and Networking Symposium, San Diego, CA, USA (2011), pp. 5–10
8.
Zurück zum Zitat S. Kak, On the method of puzzles for key distribution. Int. J. Parallel Prog. 13(2), 103–109 (1984)MATH S. Kak, On the method of puzzles for key distribution. Int. J. Parallel Prog. 13(2), 103–109 (1984)MATH
9.
Zurück zum Zitat M. Hellman, An overview of public key cryptography. IEEE Communications Magazine 50th Anniversary Issue: Landmark 10 Papers, May 2002, pp. 42–49 M. Hellman, An overview of public key cryptography. IEEE Communications Magazine 50th Anniversary Issue: Landmark 10 Papers, May 2002, pp. 42–49
12.
Zurück zum Zitat P. Van Hentenryck, L. Michel, Constraint-based local search (The MIT Press, Cambridge, 2009) P. Van Hentenryck, L. Michel, Constraint-based local search (The MIT Press, Cambridge, 2009)
13.
Zurück zum Zitat Berthier, D., Constraint Resolution Theories (Lulu.com Publishers, 2011) Berthier, D., Constraint Resolution Theories (Lulu.com Publishers, 2011)
15.
Zurück zum Zitat C. Gomes, B. Selman, Heavy-tailed phenomena in satisfiability and constraint satisfaction problems. Journ. Autom. Reasoning 24, 67–100 (2000)CrossRefMathSciNetMATH C. Gomes, B. Selman, Heavy-tailed phenomena in satisfiability and constraint satisfaction problems. Journ. Autom. Reasoning 24, 67–100 (2000)CrossRefMathSciNetMATH
16.
Zurück zum Zitat R. Barták, M.A. Salido, F. Rossi, New trends in constraint satisfaction, planning, and scheduling: a survey. Knowl. Eng. Rev. 1–24 (2004) R. Barták, M.A. Salido, F. Rossi, New trends in constraint satisfaction, planning, and scheduling: a survey. Knowl. Eng. Rev. 1–24 (2004)
18.
Zurück zum Zitat A. Herzog, N. Shahmehri, C. Duma, An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)CrossRef A. Herzog, N. Shahmehri, C. Duma, An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)CrossRef
20.
Zurück zum Zitat C. Blanco et al., A systematic review and comparison of security ontologies, in Proceedings of International Conference on Availability, Reliability and Security (ARES), Barcelona (2008), pp. 813–820 C. Blanco et al., A systematic review and comparison of security ontologies, in Proceedings of International Conference on Availability, Reliability and Security (ARES), Barcelona (2008), pp. 813–820
21.
Zurück zum Zitat A. Souag, Towards a new generation of security requirements definition methodology using ontologies, in Proceedings of 24th International Conference on Advanced Information Systems Engineering (CAiSE’12) Gdańsk, Poland, 25–29 June 2012, pp. 1–8 A. Souag, Towards a new generation of security requirements definition methodology using ontologies, in Proceedings of 24th International Conference on Advanced Information Systems Engineering (CAiSE’12) Gdańsk, Poland, 25–29 June 2012, pp. 1–8
22.
Zurück zum Zitat C. Torniai et al., Leveraging folksonomies for ontology evolution in e-learning environments, in Proceedings ICSC’08. Proceedings of the 2008 IEEE International Conference on Semantic Computing (EEE Computer Society Washington, DC, USA, 2008), pp. 206–213 C. Torniai et al., Leveraging folksonomies for ontology evolution in e-learning environments, in Proceedings ICSC’08. Proceedings of the 2008 IEEE International Conference on Semantic Computing (EEE Computer Society Washington, DC, USA, 2008), pp. 206–213
23.
Zurück zum Zitat G. Paliouras, D. Constantine, G. Tsatsaronis (eds.), Knowledge-Driven Multimedia Information Extraction and Ontology Evolution. Lecture Notes in Computer Science, IX, vol. 6050 (Springer, Berlin, 2011), 245 p G. Paliouras, D. Constantine, G. Tsatsaronis (eds.), Knowledge-Driven Multimedia Information Extraction and Ontology Evolution. Lecture Notes in Computer Science, IX, vol. 6050 (Springer, Berlin, 2011), 245 p
Metadaten
Titel
Security Applications Using Puzzle and Other Intelligent Methods
verfasst von
Vladimir Jotsov
Vassil Sgurev
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-14194-7_10