The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ihıs article presents an analysis on the attacks related to the sensitive data breach in the Web ecosystem. The study is based on an Meta-Analysis which identified the significance of 21 years of relevant contributions to the subject. Considering the results we elaborate two contributions: (i) we group attacks according to their behavior and (ii) we reveal the most serious emerging attacks. Additionally,...
The growing intelligence and popularity of smartphones and the advances in Mobile Ubiquitous Computing have resulted in rapid proliferation of data-sharing applications. Instances of these applications include pervasive social networking, games, file sharing and so on. In such scenarios, users are usually involved in selecting the peers with whom communication should take place, continuously facing...
Industrial Control Systems (ICS) are used for operating and monitoring industrial processes. Recent reports state that current ICS infrastructures are not sufficiently protected against cyber threats. Unfortunately, due to the specific nature of these systems, the application of common security counter-measures is often not effective. This paper summarizes experiences over a series of research efforts...
Computing power is shifting from local computers to a globally distributed system of servers. Data that used to be stored on the user's machine as well as applications that process this data are now part of the “cloud”. While there are various advantages in doing so such as cost, performance and availability; security and trust relationships now become major issues. For instance, in the cloud, computations...
We address the detection of process-related threats in control systems used in critical infrastructures. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the industrial process. We use logs to detect anomalous patterns of user actions on process control application. A preliminary case study suggests...
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
In any systems or environments within a ubiquitous computing context that promotes the concept of users interaction or inter-organization communication, more specifically data sharing and takes users within such context as relevant contextual information, there is the potential for interactions between systems to occur that may affect the security of the overall system. We present a scenario that...
Telecommunication and Internet services are constantly subject to changes, seeking the customers full satisfaction. Enriching these services with innovative approaches such as context-aware, social, mobile, adaptable and interactive mechanisms, enables users to experience a variety of personalized services seamlessly across different platforms and technologies. In this sense, it is expected that next...
While the importance of trust in the online vendor and electronic channel for e-commerce transactions is well established, less is known about factors that influence trust in e-government services. Moreover, perceptions of trust depend heavily on the cultural context and thus can vary across countries. This study investigates differences in trust and consumption of public services by citizens across...
Pervasive concept becomes present trends to develop new complicate networked computer systems. On the other side, SOA is one of ideal key technologies to realize pervasive concept. In this paper, we try to glue the gap between the concept and the technology by a case study. In our case study, we present and implement a high reliable monitor and alert system for coal mining. Such system requires high...
This research aims to examine the legitimation process that gains stakeholder support for information system projects. A qualitative case study approach was employed to investigate a smartcard system project at a regional university in China, with semi-structured interview as the main data collection method. This case study revealed that the legitimation process consisted of four main project phases...
Cyber-Individual, with a short term 'Cyber-I', is a real individual's counterpart in cyberspace. It is closely related to human-centric computing ideology which focuses on placing human in the center of computing. The study on Cyber-I tries to re-examine and analyze human essence in the digital era. Cyber-I's vision is to create a unique, digital, comprehensive description for every real person being...
Random key graphs form a class of random graphs naturally associated with the random key predistribution scheme of Eschenauer and Gligor. We compute the clustering coefficients of random key graphs, and then compare them with Erdos-Renyi graphs in the many node regime when the expected average degrees are asymptotically equivalent. On the parameter range of practical relevance in wireless sensor networks,...
The overall goal of this work is to provide problem-oriented support for Pattern-Oriented Analysis and Design (POAD) so that (i) we may construct a better understanding of the relationship of POAD to other software development approaches and (ii) we can extend the reach of problem-orientation to design patterns. This paper extends our previous contributions to show how both high-level and detailed...
Software architecture has become essential in the struggle to manage today's increasingly large and complex systems. Software architecture views are created to capture important system characteristics on an abstract and, thus, comprehensible level. As the system is implemented and later maintained, it often deviates from the original design specification. Such deviations can have implication for the...
As new security technologies are introduced in public transportation systems, their accessibility for the disabled needs to be evaluated. We analyze the usability of the passenger process in airports alongside the security risk, both from the point of view of the disabled and elderly passengers. A process-centered analytical framework has been developed. The methodology is to identify different user...
This paper proposes a partial implementation of an integrated Quality, Security and Environment management system to deal with the definition of an appropriate global management plan. This implementation is based on the multi-objective influence diagrams which are one of the most commonly used graphical decision models for reasoning under uncertainty with multiple objectives.
The pervasive computing field is almost always addressed from application, middleware, sensing or human computer interaction perspective. Thus, solutions are usually designed at application level or involve developing new hardware. Although current layered network architectures (mainly TCP/IP stack) have enabled internetworking of lots of different devices and services, they are neither well-suited...
Many network visualizations make the assumption that an administrator has previously determined the subset of data that should be visualized. Yet the problem remains that if the visualization provides no insight into the network events that warrant further consideration, then the administrator must go back to the data to determine what should be visualized next. This is a critical issue given the...
This paper developed a conceptual model through a survey of literature on e-service, and then it has a demonstration analysis of the world's largest online bookstore in China Dangdang.com. The study measured the impact of four dimensions on e-satisfaction and funds the relationship between e-satisfaction and e-loyalty. According to their relationship, it will give a hand to the online bookstore manager...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.