The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart Grid applications are imposing challenging requirements of security and reliability on the N-way communication infrastructure being designed to support multiple grid applications. These challenges stem from the increasing incorporation of distributed renewable energy sources on to the grid, the rising deployment of electric vehicles, and active consumer participation into power grid operations,...
The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer's point of view, relying upon a...
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. However, cloud computing facing so many security challenges due to the possible compromise or byzantine failures. In this paper, we focus on Ensuring data storage security in cloud computing, which is an important aspect of Quality...
Security is an important QoS attribute for characterizing intrusion tolerant systems. In order to evaluate security performance of an intrusion tolerant system more effectively and directly, quantifying its security is inevitable. From the view of practical application, this paper provides a novel quantifying method. The security of intrusion tolerant systems is quantified to three explicit attributes...
Quality of service (QoS) is adopted widely in Web services research and practice for various purposes such as for metadata publishing and operational management of Web services. Nonetheless, current tools for monitoring and gathering QoS information support only a limited number of QoS attributes (e.g. response time, successful execution rate, availability) and therefore can neither well keep up to...
This paper presents a novel architecture for high security, scalable video surveillance systems. The goal of this architecture concept was the creation of a virtually indestructible video surveillance system with the highest possible performance level, even under worst-case circumstances. First, the security management process used to build up such a system is introduced and analyzed, with the focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.