The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, cellular operators have started migrating to IPv6 in response to the increasing demand for IP addresses. With the introduction of IPv6, cellular middleboxes, such as firewalls for preventing malicious traffic from the Internet and stateful NAT64 boxes for providing backward compatibility with legacy IPv4 services, have become crucial to maintain stability of cellular networks. This paper...
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation...
The Connected Revolution has reached the automotive industry and the Internet penetrates into the modern vehicles. Formerly acquiring data from a vehicle was the tool of Fleet Management Systems handling commercial vehicles. In the recent years connectivity began to appear in the passenger vehicles also. The first features were infotainment and navigation, having low security needs remaining far from...
Mobile security becomes a hot topic recently, especially in mobile payment and privacy data fields. Traditional solution can't keep a good balance between convenience and security. Against this background, a dual OS security solution named Trusted Execution Environment (TEE) is proposed and implemented by many institutions and companies. However, it raised TEE fragmentation and control problem. Addressing...
In this paper we introduce the notion of gate automata for describing security policies. This new kind of automata aim at defining a model for the specification of both security and trust policies. The main novelty of our proposal is a unified framework for the integration of security enforcement and trust monitoring. Indeed, gate automata watch the execution of a target program, possibly modifying...
We present and compare architectures for using a fleet of high-speed Internet subscriber residential gateways to build a hotspot network for offload of cellular data-traffic. We address the central challenges of meeting the security and ease of use expectations of cellular telephony in implementation on popular smartphones and gateways. Attention is given to security shortcomings in the client software...
With the evolution and significant growth in wireless technology and the development of mobile commerce, businesses can achieve superior performance through the implementation of platforms for mobile payment. However, there are several platforms for mobile payment to choose from which makes the selection of an appropriate platform for specific applications a challenging task. In response to this challenge,...
With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applications, like the electronic payment which will be discussed in this paper, the lack of trust in the underlying mobile infrastructure and secure interface to legacy systems (for this case,...
Near Field Communication (NFC) provides means to close-range contactless identification and communication for mobile phones and other devices alike. NFC is a new technology but it is maturing fast as it is being standardized. The first NFC services have mostly been simple applications but with the expansion of NFC technology and its application areas there is an urgent need to move from stand-alone...
The OSGitrade service platform is universal middleware for Java-based platforms that provides capabilities for enabling service providers to deploy consumer applications and services via various business models. This paper describes motivation and requirements for a service aggregation business model and describes how OSGi technology supports it.
We present several implementations of public information collection systems. September 11th tragedy, acts of mass terrorism like DC sniper case, and suicide bombings in Europe force authorities to seek the most effective surveillance technique. It is common consensus that a common bystander does see the potentially dangerous events unwrap, and making it possible for him to notify the appropriate personal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.