Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
Designing usable and secure software is hard without tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range of security and usability engineering activities, its architecture needs to evolve to meet the workflows of these stakeholders. To this end, this paper...
Cloud data provenance is metadata that records the history of the creation and operations performed on a cloud data object. Secure data provenance is crucial for data accountability, forensics and privacy. In this paper, we propose a decentralized and trusted cloud data provenance architecture using blockchain technology. Blockchain-based data provenance can provide tamper-proof records, enable the...
Safety-critical systems are well documented and standardised (e.g. IEC 61508, RTCA DO-178B) within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to Vetronics (Vehicle Electronics), a mission-critical...
The paper presents an implementation of IoT gateway for smart metering in electrical power systems. The gateway is based on Ubuntu Core operating system and connects power meters with external cloud services. Several software architecture design patterns are evaluated. Adaptation of them for the design of the software architecture of the gateway application is described in the paper. Based on the...
The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet services: (i) their modeling, provisioning and management, (ii) data protection, and (iii) data collection, storage and analysis. FISA is in its second edition and results from the fusion of the PASCS (Privacy and Accountability for...
In terms of data, infrastructure, and virtualization, security is one of the main concerns Private Clouds have been perceived as a relatively impervious deployment model among Cloud models. Confidentiality, integrity, availability, authenticity, and accountability are the essence of security objectives for information systems and the services they offer. Moving assets to remote locations has exposed...
This paper reports on a case study that was conducted in a cloud High Performance Computing (HPC) project one that used very sensitive and confidential data. The study aimed to explore the security challenges and practicalities that occur within a cloud HPC project and to develop a method for making critical security decisions. Action research was used to examine the nuances throughout the project...
Cloud computing delivers computing resources as services rather than products over a network. As an emerging trend, it is quite necessary to evaluate working performances and security issues that cloud computing deals with. This paper is a review of existing results on modeling and simulation technology which are powerful tools to deal with security issues [32]. Reiteriating the basic concepts and...
This paper describes the architecture and design of WSN based applications integrated with cloud based delivery model for a fast and reliable data transmission to the end users. The operational challenges of Wireless Sensor Network (WSN) have increased the need for additional resource support from different paradigms. Cloud computing has emerged as a powerful backbone for providing resource support...
As the paradigm of future information technology architecture, cloud computing has been a hot issue since it emerged. However, data privacy protection is perceived as the most important challenge that cloud tenants concern, and conventional protection technology sometimes can not be applied to cloud data efficiently. In this paper, a scheme is proposed to protect the tenants' data privacy in cloud...
Big Data are becoming a new technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models. There is a vital need to define the basic information/semantic models, architecture components and operational models that together comprise a socalled Big Data Ecosystem. This paper discusses a nature of Big Data that may originate from different...
Multi-tenancy architecture (MTA) is often used in Software-as-a-Service (SaaS) and the central idea is that multiple tenant applications can be developed using components stored in the SaaS infrastructure. Recently, MTA has been extended where a tenant application can have its own sub-tenants as the tenant application acts like a SaaS infrastructure. In other words, MTA is extended to STA (Sub-Tenancy...
This research paper aims to explore the underlying cloud computing architectures with respect to security and auditing services. As most of the standards have not been defined yet for cloud computing, academic and industrial researchers are participating with their ideas and proofs. We have surveyed and classified the available cloud computing architectures into three categories which are 1) Architecture...
MANETS are used in a variety of applications today ranging from military communications networks to emergency response team networks. Their dynamic network topology is one of the greatest strength in employing MANETS, but invites many opportunities for cyber security attacks as computational power for these systems is always a viable resource. This paper documents a study where a MATLAB simulation...
This paper describes the Mission Assurance Analytics Platform (MAAP), an open, experimental software framework that provides analysts with an environment for systematically studying the link between cyber attack and the resulting impact on operational missions that are supported by a cyber system. MAAP directly informs both risk decisions and mitigation prioritization.
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security, including distributed networks of internet enabled objects (as in the Internet of Things). The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for...
Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc Network (MANET) technologies, offer considerable advantages for military operations, such as increased network survivability and interoperability. The RRS-based Common Tactical Radio System (GTRS), currently in development by the Swedish Armed Forces, is designed for use in diverse geographical settings and...
We describe a research program on design techniques to enable the cost-effective construction of trustworthy systems. The focus is on single-machine systems that can be formally verified to provide desired system-wide security and safety properties. Such systems are designed as compositions of small trusted components and large untrusted components whose behaviour is constrained by an underlying formally...
Describing generic logical data models for two existing cloud computing architectures, the author helps develop a common set of architectural requirements to facilitate traceability between evolving business requirements and cloud architecture implementations.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.