The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud database management systems (DBMSs) often decouple database instances from physical storage to provide reliability and high availability to users. This design can robustly handle a single point of failure, but needs substantial effort to attain good performance. In this paper, we analyze the decoupled architecture and present important optimization issues that we faced in implementing the design...
It is estimated that, nowadays, around 40 records containing private data are leaked every second. Many of these illegally obtained records are due to the lack of security measures taken into consideration. One of the biggest mistakes that can be done, when it comes to data security, is to store data in plaintext, because a vulnerability that gives an attacker access to the database may result in...
Standard Port-based Network Access Control (NAS) with tagged Virtual Local Area Networks (VLANs) systems are useful to authenticate users within an isolated network environment. This approach on its own, however, lacks the flexibility and granularity level that new generation networks based on SDN (Software Defined Networking) can provide. The flow-based access control provides a more appropriate...
The growing importance of huge amount of data and the data analysis for business agility has prophesied managerial decisions to ensure data security and disaster recovery options. This growing dependency has triggered extensive storage of data and development of ‘high availability’ databases. One of the prevalent practices in the industry is to provide for a data center (DC) where the on-going service...
As the complexity of the cyber attacks are increasing, there is a growing demand for proactive defense against them. CYBersecurity information EXchange (CYBEX) is playing a crucial role to implement proactive defense. CYBEX conveys organizations' sensitive information which demands proper access control management. However, previous works in this area do not consider access control for CYBEX. In this...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. We have been working on a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. It uses identifiers of IT assets to locate vulnerability...
This study describes our recent progress on developing ESCALATION (Easy Used and Customizable General Reporting Application). ESCALATION Report is an independent web based reporting system that aims to offer easiness and flexibility for enterprise and organization in generating report. Data owned by enterprise or organization could be physically located in many different places and different system...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. This paper introduces a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. We use open information and standardized, non-proprietary...
Accessing the latest information of scientific and technological research projects and its results, is an essential requirement for the success in innovation. To provide the information access, Information Management Models are needed to promote innovation and improvement of existing research.
Most of the organizations not only compete in their field of expertise, but they also compete to be the leaders and the initiators of using modern applications and advanced technologies. Therefore, as the amount of data to be stored is inevitably increasing, the demand for faster data retrieval and sharing is getting higher and the level of security is becoming more critical. Most organizations enter...
Service systems create value through interactions among people and technology. Though information technology (IT), such as those that support electronic commerce, are key resources in IT-based service systems, it is the people in the system, the computer system administrators, who play the most critical role in making these systems work. In our ethnographic studies of IT service delivery, we found...
Due to its general usage in modern buildings, WiFi has been studied as a promising good low-cost solution to build localization services, but many other approaches are possible. Both industry and academy are putting considerable efforts in studying affordable and accurate alternatives, and no de facto standard exists yet. While technological diversity can be good in terms of flexibility, allowing...
Cloud computing provides access to network as when need arises in the sharing environment where configurable resources are available. This provides various services such as data access, computation, software, storage. These services don't need involvement of end user like about the location and integrable part of system through which services are delivered. As data transmission over the internet or...
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. As a solution for solving the above problem, there is the approach of Policy-based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control of every user...
With the increasing popularity of cloud services and their potential to either be the target or the tool in a cybercrime activity, organizational cloud services users need to ensure that they are able to collect evidential data should they be involved in litigation or a criminal investigation. In this paper, we seek to contribute to a better understanding of the technical issues and processes regarding...
The advent of the Internet has provided people around the world with access to information and services from across the globe that is published without any mediation by governments or other agencies. However, access to this information and services may be restricted within the viewer's own country by their Government, Internet Service Providers, employers and families among others. The motivations...
Programmability is one of the key factors on software defined networks (SDN),once it allows to decouple between data plan and control plan. However, in such context, managing several applications' inputs and outputs is a little explored task on controllers field, which are not in a controlled and organized environment. This article proposes a method to make SDN applications to reach the administrator,...
An agile, lightweight, but secure extensible hybrid application container and deployment mechanism for mobile devices has the potential to provide improved cross platform support, reduced development lifecycle time and a consistent application security model within large organizations. We demonstrate how such an architecture can provide a set of security and mobile device management interfaces to...
GakuNin is a federation for constructing an academic authn & authz infrastructure by using single sign-on (SSO) technology in Japan and it consists of academic eresource providers and consumers, e.g. Universities, Electric Journal Publishers and so on. The expansion of SSO target systems causes several issues in its infrastructure. In this paper, we focus on the issues, (1) rapidly increasing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.