The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This issue is the second part of the Special Issue on Networking for Big Data. The first part, with eight article, was published in the July/August 2014 issue of IEEE Network. Since then, we have witnessed fast development in various aspects of big data, such as theories, applications, and platforms.
With the advancement of internet and smart devices from decades, Societies appear ready to adopt new technologies as fast as they emerge. In today world, advances are making thoughts into reality. Every day we read about new advancements, one emerging area with such advancement is that of UBIQUITOUS COMPUTING (UbiCom). UbiCom is a latest concept of computing where we can see the use of computing anywhere...
Network is an interconnected system of living or non-living things. In broadcasting communication system, group of broadcasting stations transmits the same programs “the networks compete to broadcast important events”. MANET Stands for “Mobile Ad Hoc Network.” Mobile ad hoc wireless network can change its locations and configure itself on the fly. It communicates with other network via wireless medium...
Mobile devices are now well integrated with advanced capabilities and technologies such as the Internet. Today, mobile security has become a globally critical issue due to the high usage of mobile devices, their convenience and mobility. However, they are not properly protected compared to computer and computer networks, and the users pay less attention to the security updates. Recently, mobile devices...
Master in Computer Science programs (MS-CS) are critically important in producing competitive IT professionals and preparing students for doctorate research. A major challenge is how to integrate the latest computing technologies into MS-CS programs without compromising the computer science foundation education. This paper shares Pace University's study and experience in renovating its MS-CS program...
Shoulder-surfing, phishing and keylogging are widely used by attackers to obtain users' sensitive credentials. In this paper, we propose a framework to strengthen password authentication using mobile devices and browser extensions. This approach provides a relatively high resilience against shoulder-surfing, phishing and keylogging attacks while requires no change on the server side. A prototype implementation...
Morden Electronics devices and electronic commerce applications characterized by high volume of transactions can't survive without an online support of computer system and database technology. It gave birth to distributed real-time database systems, a new form of distributed database system, in which, transactions have deadlines or timing constraints. Again, the rapid growth in Mobile Computing Technology...
M2M, means “Machine to Machine”, including “Machine to Mobile”, “Man to Machine”, etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large...
The generation of young people who do not remember life before the Internet, who grew up surrounded by computing technology and mobile phones, are often referred to as `digital natives'. This generation has a special affinity to mobile devices - young people often carry their mobile phones with them at all times to keep a constant connection with their friends while also consuming and creating digital...
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirements. Also the rapid development of new service landscapes calls for standardized, yet highly flexible security protocols. It has been demonstrated that the increasing number of application contexts of these highly flexible...
Mobile communication has been heavily applied in the current healthcare system for health information exchange. Patient information security has become a major concern, especially with the wide adoption of electronic medical records. Mobile forensics has been utilized by law enforcement to systematically procure and preserve mobile evidence. However, the adoption of mobile forensics in the healthcare...
With the appearance of mobile office and the development of wireless network technology, the wireless mobile office system emerge as the times require. The security problem of private network and Internet wireless connection is increasingly outstanding. In this paper, through the deep research on the wireless security problem, using SSL VPN, AES and ECC technology, puts forward a security strategy...
The security of electronic transactions depends on the security of the user's terminal. An insecure terminal may allow an attacker to create or manipulate transactions. Several techniques have been developed that help to protect transactions performed over insecure terminals. TAN codes, security tokens, and smart cards prevent an attacker who obtained the user's password from signing transactions...
Skype is a peer-to-peer (P2P) voice over IP (VOIP) chat program. It provides its clients with an inexpensive means to communicate worldwide via the Internet through wired and wireless networks. In the past this application was limited strictly to computers, yet with continuous advancements in mobile communication, Skype phones and other mobile devices have recently hit the market in an attempt to...
Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security...
We find that traditional authentication ways donpsilat act well in MANETs for the features of dynamic topology and non-existence of central facilities in mobile ad hoc networks. This paper presents a distributed trust proving language, which is based on role trust. The solution of constructing credential authentication infrastructure and the problem how to perform automated trust negotiation are also...
Studying biologically inspired systems had received a great interest in few last years. Artificial neural networks, evolutionary computation, DNA computation, and artificial immune systems are some of the researcher interest which can be highlighted. The human immune system (HIS) is a compound of molecules, cells, and organs which has established to perform several tasks; imperfect detection, distributed...
A distributed and dynamic threshold group signature scheme without a designated group manager is proposed in this paper. The proposed scheme not only can satisfy the properties of threshold group signature, but also has distributed and dynamic properties, that is, the proposed scheme allows that any t or more group members collaboratively admit prospective members or revoke group members without the...
In ambient environments both quantity and quality of context-aware, personalizable information will continuously increase. Acceptance and benefit will depend on personalization technologies which enable end-users to protect their privacy. However, starting from the experience how users, service providers and network operators nowadays take advantage of personalised services the authors deplore inadequate...
This paper aims at providing definition of technology to track the origin of the attacking programs such as hacking and viruses. In addition, it offers the guideline of the prerequisite factors as for networking and other generals when taken into account tracking technologies for counter-cyber attacks to program developers including security companies. For these purposes, this paper also conceptualize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.