The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber attacks are a critical threat to government infrastructure, commercial enterprises and personal devices. When belligerents attack cyber systems, they need to spread laterally to reach high value targets and communicate with their command and control sites. Intuitively, a layered defense including intrusion detection systems will limit the adversary's exploitation of the target. We apply lessons...
Security challenges in cloud environments remain largely catastrophic due to the nature of the cloud; complex, heterogeneous, widely accessible over the internet, and virtualised resource sharing. Static and boundary-based conventional security approaches are clearly not effective as the sole countermeasures. Instead, countermeasures need to be intelligent with a high degree of autonomous, self-managing...
A federated cloud environment is composed of interconnected clouds that share resources using an interface, transparent to users. In such environments, ensuring security is a complex task, since individual characteristics of each federated cloud has to be considered. This is one important issue, which can prevent companies and organizations from adopting federated clouds. In this context, this paper...
The OPTIMATE prototype is a tool developed to perform simulations involving multiple market areas and market rules. The platform models the sequence of actions taken by Transmission System Operators, Market Players and Power Exchanges from day-ahead to real-time. The purpose of the present paper is first, to present the most recent developments of the platform regarding reserve management strategies;...
The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business...
In this short position paper I consider the contributions that software engineering as a discipline can make to the development and implementation of government policy. It is intended to support the growing body of knowledge on scientific advice in government and to encourage software engineers to engage with policy and the policy community.
‘Utility computing’ was the concept introduced by John McCarthy in 1961 in a speech given at MIT. He proposed that sharing the computing power on a time-sharing basis will help grow business of ‘providing computing power as an utility’ and this was the inception of the cloud computing. Cloud computing can deliver the best to the end users either through the private, public or hybrid cloud infrastructures...
E-payment systems by their nature are complex. Thus, with lack of well-designed formal models to provide a suitable method for their modelling and monitoring many challenging tasks will remain unsolvable. The present work aims at designing and implementing an e-Payment Protocols Formalism, PPF, to allow properties examination and verification for e-payment protocols. The proposed formalism was built...
In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly...
We are discussing a framework for formally modeling and analyzing the security of trusted boot processes. The presented framework is based on actor networks. It considers essential cyber-physical features of the system and how to check the authenticity of the software it is running.
In recent years, cloud computing is no doubt one of the most-talked-about terms in both the industry and academic worlds. In clouds, resources are delivered as services over the Internet in a pay-as-you-go fashion. By leasing cloud platforms to run their business, startups can achieve cost-saving and scale-up elasticity without being concerned about over-provisioning or under-provisioning for a service...
Cloud computing has emerged as a fast-growing paradigm for storing/sharing data and delivering services over the Internet. It provides its users with a way to deal with information or data without investing in any new technology or resources of their own. Although cloud computing environment is viewed as a promising Internet-based computing platform, the security challenges it poses are also equally...
Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user's usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud...
Intro: Computer network defense has models for attacks and incidents comprised of multiple attacks after the fact. However, we lack an evidence-based model the likelihood and intensity of attacks and incidents. Purpose: We propose a model of global capability advancement, the adversarial capability chain (ACC), to fit this need. The model enables cyber risk analysis to better understand the costs...
The last decade has witnessed a huge number of innovations and new technologies which have impacted our routines and have simplified our lives. Higher Education is an exception to this scenario and still in its nascent stage when it comes to technology adoption and collaboration. This paper attempts to figure out the reasons and suggest remedial measures. The world around us is moving so fast and...
At present, security-related engineering usually requires a big up-front design (BUFD) regarding security requirements and security design. In addition to the BUFD, at the end of the development, a security evaluation process can take up to several months. In today's volatile markets customers want to influence the software design during the development process. Agile processes have proven to support...
The safety of passengers is a major concern to airports. In the event of crises, having an effective and efficient evacuation process in place can significantly aid in enhancing passenger safety. Hence, it is necessary for airport operators to have an in-depth understanding of the evacuation process of their airport terminal. Although evacuation models have been used in studying pedestrian behavior...
Cloud Computing has transformed the software support for large systems from server to service oriented paradigm. This drift has evolved new challenges for design and delivery of services over heterogeneous requirements and environments. This brings about risks and challenges for systems. The system over internet are vulnerable to performance and security risks. The performance is a composite evaluation...
In today's information technology (IT) era, a major part of the costs is being spent on computational needs. Enterprises are in efforts to increase their Return on Investment (ROI) and individuals are trying to reduce their costs. In this regard, cloud computing which emerges as a fifth utility can reduce costs and enhance performance of IT solutions. A large number of companies and institutions are...
In this paper we propose a new approach for managing capability within organisations that are engaged in identity-attribution or identity-enrichment exercises. Specifically, we believe that a modelling framework which uses a bottom-up data-driven approach encapsulates the most appropriate abstraction of capability. In particular, that this should be agnostic (but aware) of the type of capability provider...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.