The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, many financial sectors are evolving with huge numbers of web applications, which plays a crucial role in organizations to make important decisions. Considering this, the data has to be secured in order to prevent it from any attacks which lead to a huge loss. One of the topmost attacks in the database is SQL injection attack, is injecting some malicious query into the database causing...
eScience middleware frameworks integrating multiple virtual organizations must incorporate comprehensive user identity and access management solutions. In this paper we examine usage patterns for these systems and map the patterns to widely used security standards and approaches. We focus on science gateways, a class of distributed system cyberinfrastructure. Science gateways are end user environments...
Many identity federations are designed to be used with web browsers. This paper proposes an approach for integrating non web-based applications with web-based identity federations using Kerberos protocol. We evaluate this approach by making NFS server available for users of SAML-based identity federation of Baden-Württemberg state of Germany. We make use of LDAP-Facade software for federating non...
The paper describes the creation of a novel cloud broker created to provide efficient cloud brokering services for a government organization in India — the BroCUR. The BroCUR works in a volunteer federated, distributed schema with control being executed using a combination of threshold based metrics and triggers which launch task migration. The novel aspect of the BroCUR is the inclusion of the human...
The paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/ORB standards. The paper introduces a novel approach that provides for automatic role activation by the security components of the middleware, which brings role-based access control to security-unaware applications. Role-based access control has been being recognized as...
Most computer-based systems require the ability to store information continuously in order to meet life cycle requirements of the data. The simplest way to meet these requirements typically involves using a centralized data store (relational or otherwise). In this paper, we analyze these requirements as they present themselves in the Voice over IP (VoIP) field, discuss the approach proposed by the...
According to our original vision of the Internet of Things (IoT), it should be possible to create ad hoc and loosely coupled information flows between any kinds of products, devices, computers, users, and information systems in general when and as needed. However, this is still challenging to achieve in practice due to the lack of sufficiently generic and standardized interfaces for creating the needed...
Over the past decade business continuity management (BCM) has been treated mainly from either technology or planning perspective. This paper goes a step further and considers BCM from the IT governance view. In addition, the standards and legislation activities are evaluated with cases from Croatia and Bosnia and Herzegovina. Implementation of industry best practices standards and processes such as...
This document introduces PRISM, an application of multi-domain address book which provides a global and simple access point to communication and multimedia services independently of existing application silos. PRISM also enriches the address book with IMS based network services such as Extended Presence and Personal Data Synchronization which free the end users from devices constraints. As PRISM is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.