The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location Based Services in the world of mobile devices has been used widely in all sectors and in various applications. It allows one to track the location, track services and also perfom other location based operations. Although it's uses are very significant, the information related to location has opened up opportunities for adversary to misuse the mobile clients. This paper addresses one such...
Due to data intensive and sophisticated tasks in scientific experiments, workflows have been widely used to enable repetitive task automation and data reproducibility. This yields to the need for effective and efficient search mechanisms for scientific workflows discovery as workflow retrieval systems require a model which fulfills several requirements: unification, accuracy, and rich representations...
The mitigation of insider threats against databases is a challenging problem as insiders often have legitimate access privileges to sensitive data. Therefore, conventional security mechanisms, such as authentication and access control, may be insufficient for the protection of databases against insider threats and need to be complemented with techniques that support real-time detection of access anomalies...
This paper focuses on cyber infrastructures composed on sensor networks and conventional host-based systems and applications. In such an infrastructure, assuring data trustworthiness is critical and requires the acquisition and recording of provenance information. This paper discusses research directions to be addressed towards the development of effective provenance management systems. Directions...
In many Internet of ing (IoT) application domains security is a critical requirement, because malicious parties can undermine the eectiveness of IoT-based systems by compromising single components and/or communication channels. us, a security infrastructure is needed to ensure the proper functioning of such systems even under aack. However, it is also critical that security be at a reasonable resource...
Data-driven business processes are gaining popularity among enterprises now-a-days. In many situations, multiple parties would share data towards a common goal if it were possible to simultaneously protect the privacy of the individuals and organizations described in the data. Existing solutions for multi-party analytics require parties to transfer their raw data to a trusted mediator, who then performs...
systems for providing data privacy, there is no general methodology for determining the extent to which these techniques, tools and systems reduce practical privacy risks. We need a comprehensive framework where the privacy and utility of multiple privacy-preserving techniques could be measured. This vision paper provides directions for designing such a framework.
Successful collaborations require information and resource sharing and thus adequate access control policy management systems that control sharing among the collaborating entities. Such management systems need to be flexible in order to adapt to different environments and thus be able to support access control policy evolution. However, when dealing with large sets of evolving policies it is critical...
With the rapid development of the social networks, Collaborative Filtering (CF)-based recommender systems have been increasingly prevalent and become widely accepted by users. The CF-based techniques generate recommendations by collecting privacy sensitive data from users. Usually, the users are sensitive to disclosure of personal information and, consequently, there are unavoidable security concerns...
In this paper, we introduce Kalis, a self-adapting, knowledge-driven expert Intrusion Detection System able to detect attacks in real time across a wide range of IoT systems. Kalis does not require changes to existing IoT software, can monitor a wide variety of protocols, has no performance impact on applications on IoT devices, and enables collaborative security scenarios. Kalis is the first comprehensive...
Next-generation collaborative activities and missions will be carried out by autonomous groups of devices with a large variety of cognitive capabilities. These devices will have to operate in environments characterized by uncertainty, insecurity (both physical and cyber), and instability. In such environments, communications may be fragmented. Proper policy-based management of such autonomous device...
We present a formal method for computing the bestsecurity provisioning for Internet of Things (IoT) scenarios characterizedby a high degree of mobility. The security infrastructureis intended as a security resource allocation plan, computedas the solution of an optimization problem that minimizes therisk of having IoT devices not monitored by any resource. Weemploy the shortfall as a risk measure,...
Assured Mission Delivery Network (AMDN) is a collaborative network to support data-intensive scientific collaborations in a multi-cloud environment. Each scientific collaboration group, called a mission, specifies a set of rules to handle computing and network resources. Security is an integral part of the AMDN design since the rules must be set by authorized users and the data generated by each mission...
Vehicular Ad-hoc Networks (VANETs) are formed by a huge number of vehicles which act as the network nodes and communicate with one another. This emerging paradigm has opened up new business opportunities and enables numerous applications ranging from road safety enhancement to mobile entertainment. A fundamental issue that impacts the successful deployment of VANET applications is the security and...
Protecting sensitive data against malicious or compromised insiders is a big concern. In most cases, insiders have authorized access in file systems containing such data which they misuse or exfiltrate for financial profit. Moreover, external parties can compromise identity credentials of valid file system users by means of exploiting security vulnerabilities, phishing attacks etc. Therefore, in order...
Data are today an asset more critical than ever for all organizations we may think of. Recent advances and trends, such as sensor systems, IoT, cloud computing, and data analytics, are making possible to pervasively, efficiently, and effectively collect data. However such pervasive data collection and the lack of security for IoT devices increase data privacy concerns. In this paper, we discuss relevant...
Technological advances and novel applications, such as sensors, cyber-physical systems, smart mobile devices, cloud systems, data analytics, and social networks, are making possible to capture, and to quickly process and analyze huge amounts of data from which to extract information critical for security-related tasks. In the area of cyber security, such tasks include user authentication, access control,...
We propose a query language for a secure interoperable multi-granular provenance framework. The proposed language is independent of the underlying provenance representation and supports different types of provenance queries. We have implemented the query language into our provenance framework which is integrated with CRIS - a real world system for managing scientific data. We have also evaluated our...
Unlinkability and accountability are conflicting yet critical requirements that need to be addressed in order to preserve users' privacy as well as to protect service providers in today identity ecosystems. In this paper we present a pseudonymous identity management system in which users can carry out unlinkable on-line transactions without having to disclose their actual identity information in plain...
Recent advances of Web service technology will have far-reaching effects on Internet and enterprise networks. Web services based on the eXtensible Markup Language (XML), Simple Object Access Protocol (SOAP), and related open standards, and deployed in Service Oriented Architectures (SOAs), allow data and applications to interact through dynamic and ad hoc connections. Web services technology can be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.