The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As cloud is an emerging paradigm of computing, it throws open various challenges and issues. The major issue hindering the growth of popularity of usage of cloud computing is Cloud security. There are numerous cloud security issues, of which this paper addresses the problem of insecure APIs. APIs act as the interface between cloud provider and the customer and the security of cloud computing depends...
Despite the potential that Cloud Computing has for revolutionizing every aspect of the software industry, there are significant shortcomings in the area of security and risk assessment and mitigation. The basic value proposition of Cloud Computing is that by leasing applications online, companies have the potential to significantly reduce their operating costs. What is not often pointed out however...
Phishing is the criminal activity of enticing people into visiting websites that impersonate the real thing, to dupe them into revealing passwords and other credentials to carry out financial fraud. This less suspected and high profile attack lays a deceit trap to the unwitting and gullible customers to part with their sensitive credentials to unauthorized entities. The inherent suave and subtle vulnerabilities...
A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Key management is crucial part of security, this issue is even bigger in MANETs. The distribution of encryption keys in an authenticated manner is a difficult task. Because of dynamic nature of MANETs, when...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.