The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conventional online social networks (OSNs) are implemented in a centralized manner. Although centralization is a convenient way for implementing OSNs, it has several well known drawbacks. Chief among them are the risks they pose to the security and privacy of the information maintained by the OSN; and the loss of control over the information contributed by individual members.
Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which has become one of the most influencing learning paradigms. In this context, e-Learning stakeholders, are increasingly demanding new requirements, among them, information security...
This paper discusses the technical, legal and sociological issues that are encountered when trying to share sensitive security information across multiple management domains. In particular, it investigates the issues encountered when these management domains are in differing legal jurisdictions, and proposes a format for a Cross-Border Information Sharing Agreement (CB-ISA).
This paper describes an actionable engineering framework for security engineering of a system of systems (SoS). The framework is envisioned as a tool for assessing security risks to critical missions based on the contributing systems and SoS supporting them. An SoS security risk framework is needed to manage the problem of identifying the key elements of risk to SoS missions. The issue is the complexity...
Identifying global change impacts on Defence will assist future preparedness, minimize unanticipated demand and reduce unfunded cost pressures. The physical world is observably changing, arguably at an increasing rate and perhaps irreversibly. This is provoking socio-economic, technological and geographical change — known as Global Change. These changes will affect Defence, directly and indirectly,...
The lack of a competent design theory to shape information system security policy and implementation has exacerbated an already troubling lack of security. Information systems remain insecure and therefore untrustworthy even after more than half a century of technological evolution. The issues grow ever more severe as the volume of data grows exponentially and the cloud emerges as a preferred repository...
Click jacking is an act of hijacking user clicks in order to perform undesired actions which are beneficial for the attacker. We propose Click safe, a browser-based tool to provide increased security and reliability against click jacking attacks. Click safe is based on three major components. The detection unit detects malicious components in a web page that redirect users to external links. The mitigation...
It has long been understood that the initial investment in the requirements engineering process has significant returns during the development of a system. Fragility is present in every system, although there are often no signs indicating its presence in system requirements. One can try to predict system breakdown based on its behavior, but the true sources are frequently overlooked. The fact that...
Recent years witnessed an ever growing impact of trust in the decision-making process within virtual communities. The inherent decentralized and open nature of such environments produced new challenges that received, up to now, little attention. For example, the individual and collective trust co-influence remains an unexplored issue. In this paper we are considering how user-centred and community-centred...
In response to increasing economical constraints, enterprise organization has evolved toward new structures such as networked enterprise, supply chains, virtual enterprise, or collaborative business organizations. This structural organization requires the interoperability of business processes (BPs)and information systems. Dealing with interoperability often leads to the deployment of Service-Oriented...
The interaction between business communities becomes a crucial requirement due to the need of exchanging and sharing resources and services. In general, each system defines its own security policy to manage access control to its resources. In this case, we may have security interoperability problems due to the variety and complexity of secured systems implementations. In this paper, we provide a formal...
In the security community, one main focus has been devoted to the enhancement of access control approaches with new authentication and authorization capabilities with the server to restrict others' ability. However, in the peer-to-peer (P2P) networks, no such centralized server exists, especially for the pure P2P, and the peers have to interact with unfamiliar peers. To prevent or discourage peers...
In the near future, the trend of user-generated content and services currently observable in the Internet domain will also affect the mobile environment: mobile users will become able to easily create content and small services while on the move and offer them to social communities. Mobile users will no longer be pure consumers, they will also become producers and providers of mobile content and services...
In the context of the work developed by the 4WARD project within the Future Internet, some use-cases were created to show the main aspects of 4WARD's work, highlighting the technical innovations arising from the project, and also to study the related business potential. This way, four use-cases were developed: two more user oriented (Community-oriented Applications and Internet of Things) and two...
The open source paradigm is giving rise to new methodologies, competences and processes that need to be investigated both from the technical and the organizational point of view. Many organizations are investigating the possibility to adopt open source software or migrate their systems to open frameworks also in critical environments. In this paper, we shows how the assurance has been elevated as...
In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third authorities to mediate the interactions. A peer will need reputation mechanisms by self-experiencing and incorporating the knowledge of other peers to decide whether to trust another peer in P2P systems. On the basis of introduction on the trust properties and common problems...
This paper builds on the authors' work on security challenges in the more general pervasive domain and considers what demands the adaptive paradigm will make of the information assurance community, and conversely, what information-assurance concerns should inform the realisation of pervasive adaptation. We propose a set of concepts which would enable these concerns to be addressed should they be adopted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.