Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Secure by design is an approach to developing secure software systems from the ground up. In such approach, the alternate security tactics are first thought, among them, the best are selected and enforced by the architecture design, and then used as guiding principles for developers. Thus, design flaws in the architecture of a software system mean that successful attacks could result in enormous consequences...
Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition,...
This paper describes the design and implementation of an Attribute Provider (AP), compatible with the protocol defined in the STORK 2.0 electronic identity European infrastructure that provides cross-border authentication and attribute management in web-based services.
Aadhaar, India's Unique Identity Project, has become the largest biometric identity system in the world, already covering more than 920 million people. Building such a massive system required significant design thinking, aligning to the core strategy, and building a technology platform that is scalable to meet the project's objective. Entire technology architecture behind Aadhaar is based on principles...
The Internet faces many challenges in terms of flexibility (so called IP bottleneck) as well as host-centric addressing, mobility, self-configuration, self-monitoring, and security. Several Future Internet (FI) architectures have been proposed to address these challenges including expressive Internet Architecture (XIA), Mobility First, Named Data Networking (NDN), NEBULA, and Recursive Inter Network...
This paper presents a quantitative architecture security evaluation method to identify potential risks of an architecture. The method is based on security of the architecture components. In this method, components of the architecture are classified and their security measures are identified according to component function and architecture level. Then, an integration process applies analytic hierarchy...
Accessing private and public multimedia content over the web with mobile terminals can be cumbersome. To approach this problem, we introduce an ecosystem where the content is accessed with clients that are constructed as mashups. Mashups are web applications that combine already existing data into an integrated experience. In addition to traditional mashup elements such as text and images, also other...
The increasing density of the electronic devices in everyday activities is turning system interoperability into an emerging research scenario with a clear impact on life quality. Interoperability architectures try to overcome the complexity related to the heterogeneous procedures, interfaces and access protocols required to operate devices by providing users a single control point on their electronic...
Risk assessment plays a significant role in Decision Support Systems (DSS). Recently, there have been efforts to exploit the potential of linking risk assessment to security provisioning to provide risk-aware security services. One of these efforts is the Context-Risk-Aware Access Control (CRAAC) model that links requesters' access privileges to the risk level in the underlying access environment...
This paper presents the development of E - School System Architecture (ESSA), the architecture for an E-Learning System. This architecture is introduced for the purpose of providing flexibility, scalability and modularity to the E-Learning system. Its main objective is to propose an architecture under which different e-learning software modules can be developed and integrated. During the course of...
Wireless Mesh Network (WMN) is characterized as rapid deployment and self-organizing, multi-hop network. It is regarded as commodity application of mobile ad hoc network. The wireless and distributed nature of WMNs and the bad security environment bring a great challenge to securing wireless mesh networks. Most schemes proposed recently are developed from security schemes of wireless local networks...
A common authentication, authorization and accounting (AAA) framework enables communication between control structures across several interconnected organizations. It is a requirement to allow users mobility or emergence of new distributed services. The path leading to a global framework contains many obstacles, technical and political, that must be overcome to achieve new generation network features...
To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability...
Anycast is a communication mode in which the same address is assigned to a group of servers and a request sent for a service is routed to the 'best" server. Because the group management and the routing protocol in the anycast are not so mature, there are distinct and significant security vulnerabilities in both the anycast model including denial of service, theft of service, eavesdropping, and...
In this paper, we propose a comprehensive trust management approach for Web services that covers the analysis/modelling of trust relationships and the development of trust management layer in a consistent manner. The specific characteristics of trust relationships in Web services are discussed. We introduce a separated trust management layer for Web services that can hold computing components for...
This paper proposes a new network cyber-security architecture for smart (energy-efficient, environmental-friendly, cost-effective, etc.) power distribution system operations. The focus is on providing cyber-security for smart (time-of-use scheduling, smart metering, dispersed generation tracking, etc.) load-management devices that are networked for collaborative operations and accessible by utility...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.