The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Safety and security in software coding is becoming increasingly important in mission-critical systems due to various emerging threats and to avoid potential disastrous consequences. These issues can be significantly reduced by software designs and implementations that adequately protect systems. This abstract describes coding methodologies in the Ada 95/2005 programming language for complex embedded...
In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly...
Radio Frequency Identification (RFID) tags in tamper-proof casings are proposed and tested as part of remote security systems for endangered plant species. The tag is shown to be sufficiently broadband and insensitive to the tamperproof box and underlying plant material and achieves a read range of more than 10m with a standard UHF reader system. Tests are undertaken to demonstrate the tag is readable...
The United Nations formulated 17 sustainable development goals to "transform our world". Goal 11 aims to "make cities and human settlements inclusive, safe, resilient and sustainable". As such, security systems have become increasingly relevant, particularly in the past several years as significant and dangerous threats have emerged throughout the world. In addition to said risks,...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
Radio Frequency Identification Device (RFID) technology use in health care services has been shown to save lives, prevents errors, save costs and increases security. Implementation of RFID technology has been challenged with high implementation costs, substantial gap between technology implementation costs and the RFID-enabled benefits, lack of common standard of usage/data analysis and low operational...
The emerging and developing technology of cloud computing may be defined as an availability of scalable and easily accessible virtualised resources allowing the various paradigms. Cloud computing thus helps to reduce cost of ownership and management of virtualized resources, lowering the market entry threshold to new players and enabling provisioning of new services. Nevertheless, it is not massively...
Nowadays the management of interconnected transmission systems requires security assessment methods able to consider uncertainties due to the increasing presence of renewable generation. Furthermore, also the electrical demand is characterized by a certain level of variability which affects the accuracy of the expected consumption profiles. Thus, probabilistic approaches are an interesting research...
In this paper, we propose a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol [16]. As a distinguishing feature, AugMQTT does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides. Also, we discuss several aspects of AugMQTT followed by performance overhead of the AugPAKE protocol...
Megrelishvili protocol is a linear algebraic-based key exchange procedure between two parties. Unlike the well-known Diffie-Hellman protocol or its variants, the security of this protocol does not rely on the generic discrete logarithm problem in a particular group. In this article we investigate Megrelishvili Vector-Matrix Problem (MVMP) as a computational problem that underlies the security of Megrelishvili...
This tutorial presents hardware verification techniques for hyperproperties. The most prominent application of hyperproperties is information flow security: information flow policies characterize the secrecy and integrity of a system by comparing two or more execution traces, for example by comparing the observations made by an external observer on execution traces that result from different values...
The significance of the continuous electric power service is getting higher and higher. Countries are developing policies to strengthen their electric power system infrastructure to sustain an acceptable level of supply security. The European electric power policies are guided by the climate and energy goals of the European Union. Climate change related extreme weather events pose a great threat against...
Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of loss of life and property. In this paper, we propose using basic statistical measures as a fingerprint to flight patterns that can be checked against previous flights. We generated baseline flights and then simulated hijacking scenarios to...
The Cargo Supply Chain Integrity Technology (CSIT) Research, Development, Test and Evaluation project, jointly managed by the Transportation Security Administration (TSA) and the Department of Homeland Security's (DHS) Science and Technology (S&T) Directorate develops standards and certifies systems to mitigate threats posed by the potential introduction of improvised explosive devices into cargo...
This presentation entitled "Securing OpenStack Cloud with Bandit" talks about Bandit, a security scanner from OpenStack Security Group. This presentation will cover details on Bandit, and how it can be used to secure OpenStack cloud and advantages of Bandit.
The rapid development in the modern technology and its widespread utilization in number of applications brings in new challenges that need to be addressed. Security is one of such challenges that has grown into a major concern over the years. Periodically new incidents of data and system breaches are reported. For this purpose, usually different side channels in the system are being exploited by the...
With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies...
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Computing paradigm. Potential Cloud Service Customers (CSCs) do not trust delegating every kind of resources and data to external Cloud Service Providers (CSPs). The problem grows in complexity due to the increasing adoption of complex supply chains: CSPs that offer Sofware-as-a-Service (SaaS) cloud services...
Graphical models are useful for discussing different aspects of processes, structures or requirements. The visual syntax of a standard modelling language cannot support all such aspects. There are several cases where it would be desirable to decorate the symbols in a diagram with additional visual annotations. This way, it is possible to include specific information (such as security requirements)...
This paper formulates the security constrained transmission expansion planning (SCTEP) into a standard two-stage stochastic programming (SP) problem with complete recourse, which is then tackled by Benders decomposition (BD) due to its special decomposable structure, additionally, three improvements are also employed to accelerate the classical BD: valid inequality, multicut strategy, and optimal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.