A survey was conducted to provide a state of the art of online banking authentication and communi... more A survey was conducted to provide a state of the art of online banking authentication and communications security implementations. Between global regions the applied (single or multifactor) authentication schemes differ greatly, as well as the security of SSL/TLS implementations. Three phases for online banking development are identified. It is predicted that mobile banking will enter a third phase, characterized by the use of standard web technologies to develop mobile banking applications for different platforms. This has the potential to make mobile banking a target for attacks in a similar manner that home banking currently is.
This paper presents architecture for secure service discovery for use in home networks. We give a... more This paper presents architecture for secure service discovery for use in home networks. We give an overview and rationale of cluster-based home network architecture that bridges different, often vendor specific, network technologies. We show how it integrates security, communication, and service discovery to achieve a secure and trusted way of deploying services in a domestic environment.
PurposeModern e‐health systems incorporate different healthcare providers in one system and provi... more PurposeModern e‐health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross‐context communications between healthcare providers, the same information can be interpreted as different types or values, so that one patient will be issued different identifiers by different healthcare providers. This paper aims to provide a solution to ensure interoperability so that multiple healthcare providers will be able to collaborate in one e‐health system.Design/methodology/approachThis paper primarily focuses on how different healthcare providers, instead of the patients, are able to interact and share information on a common e‐health platform.FindingsIn the course of the work, it was found that previous e‐health solutions mainly have a limited view of patient information, where a user‐centric approach for identity management is usually restricted to a single healthcare provider. Interoperability in ...
Business Process Outsourcing (BPO) enables the delegation of entire business processes to third p... more Business Process Outsourcing (BPO) enables the delegation of entire business processes to third party providers. Such scenarios involve communication between federated and heterogeneous workflow engines. However, state-of-the-art workflow engines fall short of a distributed authorisation mechanism for this heterogeneous, federated BPO setting.
A wide spectrum of certificate revocation mechanisms is currently in use. A number of themhave be... more A wide spectrum of certificate revocation mechanisms is currently in use. A number of themhave been proposed by standardisation bodies, while some others have originated fromacademic or private institutions. What is still missing is a systematic and robust frameworkfor the sound evaluation of these mechanisms. We present a mechanism-neutral frameworkfor the evaluation of certificate status information (CSI) mechanisms. These mechanismscollect, process and distribute CSI. A detailed demonstration of its ...
A survey was conducted to provide a state of the art of online banking authentication and communi... more A survey was conducted to provide a state of the art of online banking authentication and communications security implementations. Between global regions the applied (single or multifactor) authentication schemes differ greatly, as well as the security of SSL/TLS implementations. Three phases for online banking development are identified. It is predicted that mobile banking will enter a third phase, characterized by the use of standard web technologies to develop mobile banking applications for different platforms. This has the potential to make mobile banking a target for attacks in a similar manner that home banking currently is.
This paper presents architecture for secure service discovery for use in home networks. We give a... more This paper presents architecture for secure service discovery for use in home networks. We give an overview and rationale of cluster-based home network architecture that bridges different, often vendor specific, network technologies. We show how it integrates security, communication, and service discovery to achieve a secure and trusted way of deploying services in a domestic environment.
PurposeModern e‐health systems incorporate different healthcare providers in one system and provi... more PurposeModern e‐health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross‐context communications between healthcare providers, the same information can be interpreted as different types or values, so that one patient will be issued different identifiers by different healthcare providers. This paper aims to provide a solution to ensure interoperability so that multiple healthcare providers will be able to collaborate in one e‐health system.Design/methodology/approachThis paper primarily focuses on how different healthcare providers, instead of the patients, are able to interact and share information on a common e‐health platform.FindingsIn the course of the work, it was found that previous e‐health solutions mainly have a limited view of patient information, where a user‐centric approach for identity management is usually restricted to a single healthcare provider. Interoperability in ...
Business Process Outsourcing (BPO) enables the delegation of entire business processes to third p... more Business Process Outsourcing (BPO) enables the delegation of entire business processes to third party providers. Such scenarios involve communication between federated and heterogeneous workflow engines. However, state-of-the-art workflow engines fall short of a distributed authorisation mechanism for this heterogeneous, federated BPO setting.
A wide spectrum of certificate revocation mechanisms is currently in use. A number of themhave be... more A wide spectrum of certificate revocation mechanisms is currently in use. A number of themhave been proposed by standardisation bodies, while some others have originated fromacademic or private institutions. What is still missing is a systematic and robust frameworkfor the sound evaluation of these mechanisms. We present a mechanism-neutral frameworkfor the evaluation of certificate status information (CSI) mechanisms. These mechanismscollect, process and distribute CSI. A detailed demonstration of its ...
Uploads
Papers by danny de cock