The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication is one of an important aspect in life that supports a lot of activities. Along with the development of technology, method for communicating is also increasing. One of those methods for communication that created by advanced technology is called VoIP or Voice over Internet Protocol. At the present time, VoIP is used by a many organizations. It is because implementing VoIP has many benefits...
Users demand smarter home networks that conveniently provide networking features. Previous attempts focus on pushing more features into the gateways and making them smarter. Home gateways, however, have limited resources and cannot accommodate resource-demanding features. In this paper, in contrast, we delegate most gateway functionalities to a shared, consolidated control platform, and keep the gateway...
VoIP is replacing traditional telephony system over PSTN as a more affordable communication tool on account of convergence of networks. Meanwhile, security issue brings more attention and becomes more important. SIP is based on text message. This makes the protocol easy to implement but also creates opportunity for hackers to steal or modify the messages. There exist a various approaches to secure...
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. However, cloud computing facing so many security challenges due to the possible compromise or byzantine failures. In this paper, we focus on Ensuring data storage security in cloud computing, which is an important aspect of Quality...
The primary goal of the secure socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA decryption, it is introduced that the proposed secret exchange algorithm can be used to speedup SSL session initialization. The optimization strategy, which is...
In order to execute Bloom, we need financial resources. The biggest resource required is personnel time to provision and maintain Bloom, offer data products, and collect feedback to improve the service. Further, even though Indiana University has committed much of the computing and storage infrastructure needed to realize it, access to those resources will not be exclusive for Bloom users. Hence,...
In view of the lack of security and management mechanism in peer to peer (P2P) network, this paper designs an operational and scalable intelligent node overlay network which is P2P-oriented with digital right management functionality and good authentication and accounting capabilities supporting large-scale deployment. It not only can convenience the network communication and make the share and interact...
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however,...
The Web browser has become the centerfold application to the Internet. It has evolved from being an application for rendering static Web pages to a host of a variety of applications. The growing requirements for a Web browser have lead to code additions, vendor specific add-ons but not much change in its base design. Hence in this paper we are proposing new Web browser architecture based on local...
Moving towards an dasiaalways-onpsila, dasiamobilepsila and technology driven lifestyle, people are demanding greater technical triumph to make life more exciting, convenient and trouble-free. Automation at home has already started catering to this growing need. Another major motivating factor for this is the prospect of higher energy efficiency, greater control on home from remote locations and the...
Service overlay networks (SONs) have recently been proposed to support various value-added services including multicast, resilient routing, QoS support, and DoS resistant communication in the Internet. Access control plays an important role for various SON applications yet most SON proposals do not consider access control or assume that it is a pre-existing service. The lack of a proper access control...
Applications on network need not only enough quality of service (QoS) but also enough quality of security service (QoSS) because the security is essential for most of applications on network. The purpose of QoSS is to organize various security services together to achieve enough security for applications. As security requirements vary dramatically for different applications, differentiated security...
This paper presents a software application that can be used to secure existing web services, regardless of the language they were developed in and without any modification to the original source code. Thus, it can be used to expose internal services to external networks, in a secure way. Web service methods can be accessed based on the userpsilas rights. Furthermore, logging data can be maintained...
Opportunities are available resources that yield desired results. Their suitability depends on who seizes the opportunity and the context for its use. Opportunistic development relies on the availability of reusable software components to produce hybrid applications that opportunistically join such components to meet immediate functional or content needs. Availability and connectivity are key qualities...
This paper intends to showcase the various areas in IPTV domain where policies can be applied. Polices are set of rules which regulate the usage of critical resources thereby enforcing QOS and security. The overall architecture of IPTV involves multiple transport capabilities and network aspects at the lower layers and infinite possibilities of primary and supplementary services at the application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.