The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The next era of computing is the evolution of the Internet of Things (IoT) and Smart Cities with development of the Internet of Simulation (IoS). The existing technologies of Cloud, Edge, and Fog computing as well as HPC being applied to the domains of Big Data and deep learning are not adequate to handle the scale and complexity of the systems required to facilitate a fully integrated and automated...
There is a growing need for government agencies to monitor suspicious communication links to prevent crimes and terror attacks. In this paper, we study a legitimate surveillance scenario where a legitimate monitor aims to intercept the suspicious communication between a transmitter and a receiver over fading channels. The legitimate monitor can eavesdrop (decode) the information of the suspicious...
Service-orientation is a useful means of developing highly flexible and adaptive software systems, and it is a paradigm that has been increasingly adopted into Grids and Clouds. However, service-oriented architectures and designs also bring with them new challenges in the fields of dependability and security that need to be addressed carefully in order to provide sufficient support to enable service-oriented...
As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing...
Cloud Computing can be seen as an instance of Computing as a Utility, where customers utilize the concept of "pay-as-you-go" for applications, computing and storage resources. This concept is utilized particularly heavily in Infrastructure as a Service (IaaS) models. In IaaS Clouds, customers can instantly be allocated - and subsequently release - Virtual Machines (VMs). To achieve easy...
Immeasurable information sharing network (IISN) has been proposed for improving information sharing service in remote rural. How to ensure information security becomes a very important issue for the new network. In this paper, we propose a new conditional access system (CAS) model and a key management scheme for IISN. In the model, we place emphasis on making the CAS more suitable for IISN; we change...
Large-scale data processing systems frequently require users to make timely and high-value business decisions based upon information that is received from a variety of heterogeneous sources. Such heterogeneity is especially true of service-oriented systems, which are often dynamic in nature and composed of multiple interacting services. However, in order to establish user trust in such systems, there...
The traditional P2P routing algorithms generally don't consider the routing security. This paper proposes a new trusted routing mechanism based on trust degree for P2P network. The assessment and calculation of trust degree is the key to achieve the secure routing mechanism. In this paper, an improved method to define trust degree is presented. And then, we present the improved trusted routing mechanism...
Peer-to-Peer (P2P) networking is beneficial when removing a centralized server. On the other hand, new mechanisms are required to compensate for the central authority, especially for network security and dependability. In this paper, we propose a new fuzzy reputation (Fuzzy-Rep) model to improve security and dependability of P2P e-commerce. The model employs fuzzy logic inference rules to assess transactions...
A proposed grid middleware system includes specific enhancements to support the development and assessment of highly secure, dependable, service-oriented grid systems and applications. Service-oriented architectures can be defined as application architectures "within which all functions are defined as independent services.
Service-orientation is a highly useful means of developing flexible, agile, and dependable software systems, and is a paradigm that has been increasingly adopted into grid computing middleware. However, service-orientation brings with it new challenges in the fields of dependability and security that need to be addressed by the high assurance systems community in order to provide sufficient support...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.