The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility...
The Web application security challenge is to understand and assess the risk involved in securing a Web service today, based on existing security technology, and at the same time track emerging standards and understand how they will be used to offset the risk in new Web services. Any trust model must illustrate how data can flow through an application and network topology to meet the requirements defined...
One of the main concerns preventing grid computing from being widely spread and utilized is the related security issues. Users in a grid are concerned about the protection of their resources and about their privacy. When a host interacts with a grid, its security may be threatened in terms of its data or its computational resources. We discuss the issue of ensuring host security and propose a solution...
Wireless sensors typically operate in uncontrolled and possibly hostile environment. Thus, sensors have a high risk of being captured and compromised by an adversary. Traditional security schemes are computationally expensive, because they introduce overhead which shortens the life of the sensors. Watermarking schemes are usually light weight and do not require extensive computing and power resources...
In distributed systems, it is often needed to establish trust before entities interact together. This trust establishment process involves making each entity ask for some credentials from the other entity, which implies some privacy loss for both parties. We propose a model for achieving the right privacy-trust tradeoff in distributed environments. Each entity aims to join a group in order to protect...
We implement and test four RFID security protocols: strong private authentication protocol, efficient mutual-authentication protocol, Dimitriou's lightweight protocol, and advanced semi-randomized access control, by emulating the RFID system. Then, we analyze the results to provide an evaluation of each protocol. RFID tags are very limited in terms of processing power, and cannot perform complex computations...
Ontology analysis has been shown to be an effective first step in the construction of robust knowledge based system. Moreover, the popularity of semantic technologies and the semantic Web has provided several beneficial opportunities for the modeling and computer security communities of interest. This paper describes the role of ontologies in facilitating network security modeling. It outlines the...
A holographic system for secure storage of data in compact discs has been proposed by use of an optical variable key. The variable key, which is a photopolymer micro-hologram, was used to decrypt the data in compact disc and a unique key was provided for a unique compact disc. This unique key supports inventory, maintenance and monitoring. The system involves a key reader for optically reconstructing...
In this paper we identify a potential probing technique for remotely discovering the last-matching rules of the security policy of a firewall. The last-matching rules are those rules that are located at the bottom of the ruleset of a firewall's security policy, and would require the most processing time by the firewall. If these rules are discovered, an attacker can potentially launch an effective...
Network security management plays a crucial role in protecting organization assets and its computer infrastructure by identifying an effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is affected by multiple distinctive variables. These variables are associated with the organization assets and their impact on the health of the organization...
Studying biologically inspired systems had received a great interest in few last years. Artificial neural networks, evolutionary computation, DNA computation, and artificial immune systems are some of the researcher interest which can be highlighted. The human immune system (HIS) is a compound of molecules, cells, and organs which has established to perform several tasks; imperfect detection, distributed...
With an increase in number of services provided over internet, the demand for securing users sensitive data has also increased. Due to the simplicity of single factor (username/password) authentication mechanisms, most of the Web based services have been employing this mechanism. But these mechanisms are now not being considered secure enough for various reasons such as 1) There is a sharp increase...
With advent of access technologies such as WiFi and WiMax, access mechanisms are on the verge of providing continuous access anytime, anywhere and most importantly anyhow. The IEEE 802.16e amendment to the IEEE 802.16 standard adds mobility to the original standard and thus makes WiMax an attractive solution to provide high bit rate mobile wireless services over a broader range of coverage. However,...
It cannot be denied that documents in the form of hardcopy are still being used, especially important documents such as land titles, application forms, contracts and tickets. However there are reports of forgery cases over the years and as such, it is imperative to have a mechanism for integrity verification of hardcopy document. This research proposed the usage of two-dimensional (2D) barcodes, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.