The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Phishing is a criminal scheme to steal the user's personal data and other credential information. It is a fraud that acquires victim's confidential information such as password, bank account detail, credit card number, financial username and password etc. and later it can be misuse by attacker. We aim to use fundamental visual features of a web page's appearance as the basis of detecting page similarities...
Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access...
A wireless sensor network (WSN) is a resource-constrained network with limited battery, communication range, processing power, bandwidth, etc. and with requirements changing according to the environment and application. The increased number of WSN applications requires efficient utilization of resources in a changing environment to improve the quality of service of the communication. The medium access...
Today iris recognition systems are extensively used for security and authentication purposes due to their simplicity and high reliability. But these systems face a major challenge of being spoofed by high quality printed iris images or pictures captured by camera. The problem is aggravated by use of varying illumination conditions in an attack access attempt. This paper investigates spoofing attempts...
Cloud storage is a one of the services of cloud computing. The data owners move their data from local systems to the cloud servers provided by cloud service providers. By this, users get high quality and on-demand data storage services and user is free from the maintenance load. Beside all these benefits, there are several matters about cloud storage security. Most of the cloud service providers are...
Recent experiments in the field of VLSI designing and Nanotechnology have demonstrated a working cell suitable for implementing the Quantum-dot Cellular Automata (QCA). QCA is a transistor less computational model which is expected to provide high density nanotechnology implementations of various CMOS circuits. QCA has been constrained by the problem of meta-stable states. QCA adder with comparatively...
The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy...
Security requirement is an important aspect of system's development. There are numerous security requirements methodologies, which have been developed till date. Research is still going on to improve or create new methodologies that will make a system as secure as possible. Asset management, risk assessment, validation of functional and non-functional security requirements and security requirements...
Protection and access control to resources plays a critical role in a distributed computing system like Machine-to-Machine (M2M) and cloud platform. The M2M local cloud platform considered in this paper, consists of multiple distributed M2M gateways that form a local cloud — presenting a unique challenge to the existing access control systems. The most prominent access control systems, such as ACL...
The key measures of any project about its perfectness are ability to complete in the scheduled time and within the estimated cost. Cost and effort are important factors whenever a project is developed. The estimation of cost and effort is a difficult task in Agile environment. It has been observed that the current Agile methods mostly depends on an expert opinion, planning poker and historical data...
In the last few years Agile methodologies appeared as a reaction to traditional software development methodologies. In Agile environment the requirements from the client are always taken in the form of user-stories and prioritization of requirements is done by Moscow method, validate learning and walking skeleton methods. By literature survey it has been observed that these methods are not efficient...
In present mobile ad hoc network is an innovative and incredibly popular technology but influenced by foremost security issue because of its dynamic nature or decentralized network The black hole is one of the attack from several attack in the MANETs which advertise itself having the shortest or “freshest” route to transmit the packet to the destination and replies the route request incorrectly to...
'Cloud testing' or 'Testing on the Cloud' means transforming the traditional testing lifecycle phases while adapting to the new quality risks in the cloud environment. Additional testing almost always involves the use of the time and energy of resources and personnel, which comes at a cost. Hence, automating this testing provides significant benefits in terms of cost and time savings. Test Automation-as-a-Service...
SMS messages are one of the popular ways of communication. Sending an SMS is cheap, fast and simple. When confidential information is exchanged using SMS, it is very difficult to protect the information from SMS security threats like man-in-middle attack, DOS attack as well as ensure that the message is sent by authorized senders. These papers describe solution that provides SMS security that guarantees...
Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.