Security Applications Using Puzzle and Other Intelligent Methods

  • Vladimir Jotsov
  • Vassil Sgurev
Part of the Studies in Computational Intelligence book series (SCI, volume 586)


New types of constraints are considered. Reasons are described that lead to applications of intelligent, logic-based methods aiming at reduction of risk factors to ATMs. Special attention is paid to applications of Puzzle method in ATMs. To make a more independently functioning ATM, the proposed methods should be applied to data/knowledge/metaknowledge elicitation, knowledge refinement, analysis of different logical connections aiming at information checks.


Binding Constraint Card Holder Crossword Puzzle Semantic Conflict Security Team 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Insight. Intelligence. Information. to date
  2. 2.
  3. 3.
  4. 4.
    V. Jotsov, Intelligent information security systems. Sofia: Za Bukvite – O Pismeneh Publ. House (2010), 278 pGoogle Scholar
  5. 5.
  6. 6.
    Crossword Puzzles as Constraint Satisfaction Problems to date
  7. 7.
    S. Dhurandher et al., Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation, in Proceedings of the 14th Communications and Networking Symposium, San Diego, CA, USA (2011), pp. 5–10Google Scholar
  8. 8.
    S. Kak, On the method of puzzles for key distribution. Int. J. Parallel Prog. 13(2), 103–109 (1984)zbMATHGoogle Scholar
  9. 9.
    M. Hellman, An overview of public key cryptography. IEEE Communications Magazine 50th Anniversary Issue: Landmark 10 Papers, May 2002, pp. 42–49Google Scholar
  10. 10.
    Cassowary to date
  11. 11.
    Java constraint solver (JaCoP) to date
  12. 12.
    P. Van Hentenryck, L. Michel, Constraint-based local search (The MIT Press, Cambridge, 2009)Google Scholar
  13. 13.
    Berthier, D., Constraint Resolution Theories ( Publishers, 2011)Google Scholar
  14. 14.
    Ontology-based constraint recognition for free-form service requests.…/Al-MuhammedEmbley to date
  15. 15.
    C. Gomes, B. Selman, Heavy-tailed phenomena in satisfiability and constraint satisfaction problems. Journ. Autom. Reasoning 24, 67–100 (2000)CrossRefMathSciNetzbMATHGoogle Scholar
  16. 16.
    R. Barták, M.A. Salido, F. Rossi, New trends in constraint satisfaction, planning, and scheduling: a survey. Knowl. Eng. Rev. 1–24 (2004)Google Scholar
  17. 17.
  18. 18.
    A. Herzog, N. Shahmehri, C. Duma, An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)CrossRefGoogle Scholar
  19. 19.
    Ontological Approach toward Cybersecurity in Cloud Computing.
  20. 20.
    C. Blanco et al., A systematic review and comparison of security ontologies, in Proceedings of International Conference on Availability, Reliability and Security (ARES), Barcelona (2008), pp. 813–820Google Scholar
  21. 21.
    A. Souag, Towards a new generation of security requirements definition methodology using ontologies, in Proceedings of 24th International Conference on Advanced Information Systems Engineering (CAiSE’12) Gdańsk, Poland, 25–29 June 2012, pp. 1–8Google Scholar
  22. 22.
    C. Torniai et al., Leveraging folksonomies for ontology evolution in e-learning environments, in Proceedings ICSC’08. Proceedings of the 2008 IEEE International Conference on Semantic Computing (EEE Computer Society Washington, DC, USA, 2008), pp. 206–213Google Scholar
  23. 23.
    G. Paliouras, D. Constantine, G. Tsatsaronis (eds.), Knowledge-Driven Multimedia Information Extraction and Ontology Evolution. Lecture Notes in Computer Science, IX, vol. 6050 (Springer, Berlin, 2011), 245 pGoogle Scholar
  24. 24.
    Protégé. to date

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.State University for Library Studies and IT, Institute of Information and Communication TechnologiesBulgarian Academy of SciencesSofiaBulgaria

Personalised recommendations