Skip to main content

Security Applications Using Puzzle and Other Intelligent Methods

  • Chapter
  • First Online:
Book cover Novel Applications of Intelligent Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 586))

  • 579 Accesses

Abstract

New types of constraints are considered. Reasons are described that lead to applications of intelligent, logic-based methods aiming at reduction of risk factors to ATMs. Special attention is paid to applications of Puzzle method in ATMs. To make a more independently functioning ATM, the proposed methods should be applied to data/knowledge/metaknowledge elicitation, knowledge refinement, analysis of different logical connections aiming at information checks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Insight. Intelligence. Information. http://www.atmsecurity.com/ to date

  2. SANS Institute Reading Room site. http://www.sans.org/reading_room/-whitepapers/authentication/biometric-technology-stomps-identity-theft_126 to date

  3. POPSCI. The future now. http://www.popsci.com/technology/-article/2011-06/russian-atm-determines-bankers-identity-and-whether-theyre-telling-truth to date

  4. V. Jotsov, Intelligent information security systems. Sofia: Za Bukvite – O Pismeneh Publ. House (2010), 278 p

    Google Scholar 

  5. Constraint Satisfaction problems. http://www.cis.temple.edu/~giorgio/cis587/readings/constraints.html to date

  6. Crossword Puzzles as Constraint Satisfaction Problems http://www.cs.columbia.edu/~evs/ais/finalprojs/steinthal/ to date

  7. S. Dhurandher et al., Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation, in Proceedings of the 14th Communications and Networking Symposium, San Diego, CA, USA (2011), pp. 5–10

    Google Scholar 

  8. S. Kak, On the method of puzzles for key distribution. Int. J. Parallel Prog. 13(2), 103–109 (1984)

    MATH  Google Scholar 

  9. M. Hellman, An overview of public key cryptography. IEEE Communications Magazine 50th Anniversary Issue: Landmark 10 Papers, May 2002, pp. 42–49

    Google Scholar 

  10. Cassowary http://www.cassowary.net to date

  11. Java constraint solver (JaCoP) http://jacop.osolpro.com/ to date

  12. P. Van Hentenryck, L. Michel, Constraint-based local search (The MIT Press, Cambridge, 2009)

    Google Scholar 

  13. Berthier, D., Constraint Resolution Theories (Lulu.com Publishers, 2011)

    Google Scholar 

  14. Ontology-based constraint recognition for free-form service requests. http://www.deg.byu.edu/…/Al-MuhammedEmbley to date

  15. C. Gomes, B. Selman, Heavy-tailed phenomena in satisfiability and constraint satisfaction problems. Journ. Autom. Reasoning 24, 67–100 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  16. R. Barták, M.A. Salido, F. Rossi, New trends in constraint satisfaction, planning, and scheduling: a survey. Knowl. Eng. Rev. 1–24 (2004)

    Google Scholar 

  17. Security Ontology. http://securityontology.sba-research.org/ to date

  18. A. Herzog, N. Shahmehri, C. Duma, An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)

    Article  Google Scholar 

  19. Ontological Approach toward Cybersecurity in Cloud Computing. http://www.taketaka.com/manuscript/201009sin.pdf

  20. C. Blanco et al., A systematic review and comparison of security ontologies, in Proceedings of International Conference on Availability, Reliability and Security (ARES), Barcelona (2008), pp. 813–820

    Google Scholar 

  21. A. Souag, Towards a new generation of security requirements definition methodology using ontologies, in Proceedings of 24th International Conference on Advanced Information Systems Engineering (CAiSE’12) Gdańsk, Poland, 25–29 June 2012, pp. 1–8

    Google Scholar 

  22. C. Torniai et al., Leveraging folksonomies for ontology evolution in e-learning environments, in Proceedings ICSC’08. Proceedings of the 2008 IEEE International Conference on Semantic Computing (EEE Computer Society Washington, DC, USA, 2008), pp. 206–213

    Google Scholar 

  23. G. Paliouras, D. Constantine, G. Tsatsaronis (eds.), Knowledge-Driven Multimedia Information Extraction and Ontology Evolution. Lecture Notes in Computer Science, IX, vol. 6050 (Springer, Berlin, 2011), 245 p

    Google Scholar 

  24. Protégé. http://protege.stanford.edu to date

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vladimir Jotsov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Jotsov, V., Sgurev, V. (2016). Security Applications Using Puzzle and Other Intelligent Methods. In: Hadjiski, M., Kasabov, N., Filev, D., Jotsov, V. (eds) Novel Applications of Intelligent Systems. Studies in Computational Intelligence, vol 586. Springer, Cham. https://doi.org/10.1007/978-3-319-14194-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14194-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14193-0

  • Online ISBN: 978-3-319-14194-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics