User Authorization at the Molecular Scale

被引:32
|
作者
Lustgarten, Omer [1 ]
Motiei, Leila [1 ]
Margulies, David [1 ]
机构
[1] Weizmann Inst Sci, Dept Organ Chem, IL-7610001 Rehovot, Israel
基金
欧洲研究理事会;
关键词
molecular cryptography; molecular keypad lock; molecular steganography; password protection; pattern-generating molecular sensors; HYBRIDIZATION CHAIN-REACTION; KEYPAD LOCK SYSTEM; LOGIC GATE; SECURITY SYSTEM; FLUORESCENT CHEMOSENSOR; AQUEOUS-SOLUTION; COMPLEX; CU2+; HG2+; IMPLEMENTATION;
D O I
10.1002/cphc.201700506
中图分类号
O64 [物理化学(理论化学)、化学物理学];
学科分类号
070304 ; 081704 ;
摘要
Electronic user authorization systems help us maintain our privacy in many aspects of everyday life. However, the increasing difficulty to secure access and/or information digitally has inspired chemists to devise alternative, molecular approaches, in which users are identified by chemical means. The potential advantages of using molecular user authentication systems over conventional electronic devices are their versatility and unusual operating principles, which complicate replicating and, consequently, breaking into molecular security devices. Their molecular scale is another unique property that enables hiding such systems and, consequently, applying steganography as an additional layer of protection. Although the area of molecular-based user authorization is still in its infancy, the development of various molecular keypad locks and, more recently, a password-protected molecular cryptographic machine, indicate the possibility of protecting information at the molecular scale.
引用
收藏
页码:1678 / 1687
页数:10
相关论文
共 50 条
  • [1] User Authentication and Authorization Framework in IoT Protocols
    Mohammad, Ammar
    Al-Refai, Hasan
    Alawneh, Ali Ahmad
    COMPUTERS, 2022, 11 (10)
  • [2] User Profiling in Anomaly Detection of Authorization Logs
    Zamanian, Zahedeh
    Feizollah, Ali
    Anuar, Nor Badrul
    Kiah, Laiha Binti Mat
    Srikanth, Karanam
    Kumar, Sudhindra
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
  • [3] Authentication and Authorization of End User in Microservice Architecture
    He, Xiuyu
    Yang, Xudong
    2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [4] User's authorization in singularity operating system
    Matarneh, Rami
    Al Jubori, Suha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 439 - 445
  • [5] Using Virtualization Technology for the User Authorization System
    Polenov, Maxim
    Guzik, Vyacheslav
    Lukyanov, Vladislav
    SOFTWARE ENGINEERING TRENDS AND TECHNIQUES IN INTELLIGENT SYSTEMS, CSOC2017, VOL 3, 2017, 575 : 192 - 200
  • [6] A Computational Dynamic Trust Model for User Authorization
    Zhong, Yuhui
    Bhargava, Bharat
    Lu, Yi
    Angin, Pelin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) : 1 - 15
  • [7] Using ASP for knowledge management with user authorization
    Zhao, Lingzhong
    Qian, Junyan
    Chang, Liang
    Cai, Guoyong
    DATA & KNOWLEDGE ENGINEERING, 2010, 69 (08) : 737 - 762
  • [8] Authentication and authorization user management within a collaborative community
    Encheva, Sylvia
    Tumin, Sharil
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 563 - +
  • [9] A study on secure user authentication and authorization in OAuth protocol
    Chae, Cheol-Joo
    Kim, Ki-Bong
    Cho, Han-Jin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1991 - 1999
  • [10] Usage and Impact of Model-Based User Authorization
    Juhrisch, Martin
    Dietz, Gunnar
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2012, 25 (03) : 98 - 116