The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lithium-Ion (Li-Ion) battery packs are continuously gaining in importance in many energy storage applications such as electric vehicles and smart energy grids. Such battery packs require advanced Battery Management Systems (BMSs), which are contributions from the embedded systems and integrated circuits domain. The BMS monitors and controls the battery cells in a pack and ensures the functionality,...
Recently, the mashup services linking multiple separated platforms have appeared on the Internet. However, to communicate between different platforms, those services need the Smart Mediator as a common relaying platform. The Smart Mediator receives data from various platforms and provides a uniform OpenAPI to the mashup service developer to ease the development procedures. One of the most important...
The diverse characteristics of cloud computing like the ease of global network access, virtualization makes it a leader in the market. Along with the ease, the attack surface is a major setback in the security. Cloud forensics is one of the measures to provide a solution to security concerns. It helps in analyzing and investigating the attack. It focuses on gathering relevant evidence to support the...
The internet is vast and growing continuously. There is a need to control the characteristics and to provide security to the network. Software defined networking (SDN) is an approach where we divide the network into control and data plane. Using SDN and Hadoop in this paper we show a method to control characteristics and provide security to the network which is helpful in capacity planning and attack...
The architecture of a recently proposed Globally Asynchronous Locally Synchronous (GALS) processor dedicated to security programs is considered. Operations are performed using a number of Functional Units (FUs) grouped into a number of Execution Regions (ERs) working with independent clocks. The selection of the number of ERs as well as the distribution of the FUs among regions is approached as a...
With the development of cloud computing, there is a growing number of virtual machines (VMs) in the IaaS cloud. The VM owners can install different kinds of software on demand. However, if the software is not updated in time, it would be a great threat to the security of the cloud. But for the VM owners, it is a tedious task to keep all of the installed software up to date. In this paper we present...
Cloud computing is one of the new and very promising trends in the IT technology field, it is subject to a lot of research and continuous advances are made. Its main objectives are to deliver different services for users, such as infrastructure, platform or software with a reasonable and more and more decreasing cost for the clients. To achieve those goals, some matters have to be addressed, mainly...
Secure group communications present a unique environment where there can be multiple clients and hosts are trying to communicate securely within the group. As the number of clients and hosts increases the complexity of the communication security also increases. Group communications are based on a dynamic environment where the clients may join or leave the group at any moment. Hence it is important...
Computer system models and designs have been used in helping verification and validation activities. Computer systems have also been designed to make verification and validation easier such as the work on Design for Verification. The concepts of separation of concerns and modular design are two examples of how design decisions can make verification and validation easier. The objective of this research...
With the rapid pace of globalization and outsourcing, supply chain integrity of ICT system is gaining more and more attentions. Integrity of ICT Supply Chain has a slightly different focus from network security. Due to the increasing complexity and formidable cost and timing, it's by no means enough to guarantee the integrity of a modern ICT product through technical testing and vendor screening....
This work is related to System-On-A-Chip architectures and design methodologies, for cryptographic algorithms implementations. Alternative approaches are presented, for architecture and architectures for block ciphers, stream ciphers, and hash functions. The presented algorithms are the most wide used, in all certain of modern applications. Implementation aspects are given for both ASIC and FPGA integration...
Security and data integrity are the two primary pillars of a first-rate network. Attack is defined as an assault on the safety that derives from an intellectual peril that is an intentional attempt to elude security services and breach the security of the system. Nowadays, the new kind of network that is rising in popularity is the Peer-to-Peer networks. It is a self-sufficient network in which all...
With the increased awareness of security and safety of services in on-demand distributed service provisioning (such as the recent adoption of Cloud infrastructures), certification and compliance checking of services is becoming a key element for service engineering. Existing certification techniques tend to support mainly design-time checking of service properties and tend not to support the run-time...
Accidents of information leakage and insider threats by malicious employee are major issues in enterprise IT system. Data importance analysis methods can resolve this issue, the importance of data is automatically analyzed by the method and confirms whether the operation suits the security policy for the level of importance of the data. Insider threads are also protected by analyzing data importance...
Managing the network security events data stream, which is very large and real-time, and mining useful information from the data stream to analyse and forecast security situation, are very difficult. In this paper, we present an architecture, hybrid data stream cube, and its incremental updating algorithm. Experimental results proved that this architecture could facilitate on-line, multi-dimension,...
Cryptographic algorithms are used to enable security services that are the core of modern communication systems. In particular, Hash functions algorithms are widely used to provide services of data integrity and authentication. These algorithms are based on performing a number of complex operations on the input data, thus it is important to count with novel designs that can be efficiently mapped to...
With the emergence of pervasive 64 bit computing we observe that it is more cost effective to compute a SHA-512 than it is to compute a SHA-256 over a given size of data. We propose a standard way to use SHA-512 and truncate its output to 256 bits. For 64 bit architectures, this would yield a more efficient 256 bit hashing algorithm, than the current SHA-256. We call this method SHA-512/256. We also...
This work is related to to System-On-A-Chip architectures and designs methodologies, for cryptographic algorithms implementations. Alternatives approaches are presented, for architecture and design methodologies for block ciphers, stream ciphers, and hash functions. The presented algorithms are the most wide used in all certain of modern applications. Implementations aspects are given for both ASIC...
This work presents the hardware implementation of four hardware profile stream ciphers from the eSTREAM project. The hardware architectures are implemented using structural VHDL and, taking into account the simulation results, the best algorithm for hardware implementation is Trivium, with an 80-bit security level. This implementation requires 8 ALUTs, 289 registers, has a maximum frequency of 915...
Network protocols do not solely rely on the lower layers of the stack for security. Many of these protocols rely on a combination of layers to develop a more secure channel for data transmission. UDT, like other new next generation high speed protocols, relies on Transport, on IP, and on Network layers for data delivery and protection. However, like other existing protocols, UDT has a socket interface...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.