The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growing number of parameters in heterogeneous networks, as is the case of the fifth-generation (5G) Green networks, greatly complicates the analysis of the Security and Quality-of-Service Tradeoff (SQT). However, studying these types of relationships is crucial in Future Internet scenarios to prevent potential points of failure and to enhance the use of limited resources, increasing the user's...
Software Defined Networking (SDN) is a rapidly emerging technology that brings new flexibility to networking through the separation of the control and data plane. This paper presents one SDN based framework, among several potential valid approaches, for addressing the mobility of operational nodes within a coalition environment. The operational nodes require mobility to enable roaming, multi-homing,...
Usability is considered as one of the most important quality factors for commercial Web interfaces, along with others such as performance and security. However, most of usability evaluation methods for these Web applications do not support automatic measures. This paper addresses these issues through the presentation of an automatic evaluation model based on a systematic qualitative technique to validate...
Cloud environment consists of many components playing different roles which need to interact with each other. Based on the context the nature of interaction may vary. Trust is an essential facet for confidence-based interactions among the various entities in cloud environment. This paper presents the taxonomy of trust models and classification of information sources for trust assessment in cloud paradigm...
Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service...
The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints when...
Unmanned control vehicles are used for a variety of scenarios where the user can conduct a task from a remote location, scenarios include surveillance, disaster recovery and agricultural farming. The operation of unmanned vehicles is generally conducted over a wireless communication medium. The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through passive and...
The recent emergence of the cloud opens new challenges for data processing and integration. Indeed, unlimited access to cloud resources and the "pay as U go" model change the hypothesis for integrating and processing big data collections. This is accentuated due to cloud provider incentives to attract data providers and let them choose their cloud. In this context data services are deployed...
Future Internet of Things (IoT) systems will connect the physical world into cyberspace everywhere and everything via billions of smart objects and are expected to have a high economic impact. To date there is little work on trust computation in IoT environments for security enhancement, especially for dealing with misbehaving owners of IoT devices that provide services to other IoT devices in the...
Business process (BP) stakeholders want to enjoy the benefits of the cloud, but they are also reluctant to expose their BP models which express the know-how of their companies. To prevent such a know-how exposure, this paper proposes a design-time approach for transforming a BP model into BP fragments so that these BP fragments externalized in a multi-cloud context do not allow a cloud resource provider...
With the looming urgency of e-Health technology mandated certification, privacy protection implementation and e-Health reporting in the year of 2014, service providers have to conform to the latest e-Health regulations (i.e., the "Final Rules of 2014") in the United States. We investigated the Service Context Management Solution for both the CE (Covered Entity) and BA (Business Associate)...
AAL applications that support users (in particular, the elderly and patients) in staying at home are increasingly becoming popular in health care systems. Basically, these AAL applications provide personal information through location-aware, data-aware, and context-aware heterogeneous devices such as sensors and actuators. Obviously, due to this heterogeneity, it is very important to study the asynchronous...
Heterogeneity of future networks requires the use of extensible models to understand the Security and QoS tradeoff. We believe that a good starting point is to analyze the Security and QoS tradeoff from a parametric point of view and, for this reason, in a previous paper, we defined the Parametric Relationship Model (PRM) to define relationships between Security and QoS parameters. In this paper,...
To evaluate and select a Public Cloud Service (PCS) based on Cloud Service Requesters (CSRs) needs and demands a complex software engineering process. Selecting the wrong PCS may turn out to be costly and adversely affect business processes. To address these issues, many Cloud Evaluation and Selection Methods (CESMs) have been proposed by different researchers. Nevertheless, a number of CESMs' studies...
Future Networks will constitute a complex, highly miscellaneous, decentralized and dynamic environment, the requirements of which cannot be handled by traditional management schemes. The alternative is the approach of governance framework of service and network management, which targets at guidance of the behavior of autonomic and legal network entities and resources, based on specific service demands...
This paper analyzes the impact of the fast-growing BYOD (Bring Your Own Device) trend in the corporate mobile market, which blurs lines between business and personal usage. To enable selective funding and resource optimization for BYOD, we propose that the enterprise determines its own service delivery policy, using an enterprise Business Context (eBC) Policy tool. The enterprise is best placed to...
Recently issues about cyber-war have gained relevant attention, especially because of gravity of damages that could be caused by cyber attacks to strategic targets, mining security of citizens. Examples of targets might include national civil and military airports, command and control systems of civil and military transportation means electronic military systems for national defense, national infrastructures...
Open network promotes the cooperation activities and resource-sharing service among entities. It makes trust one of the critical issues in security field. Some trust quantification models can only quantify trust relationship in the same environment, without considering the influence of trust context. The influence of trust context to trust relationship is investigated. A definition of equivalent experience...
The federated Cloud paradigm aims to provide flexible and reliable services composed of a mixture of internal and external mini-clouds, but this heterogeneous nature is also fuelling the security concerns of the customers. To allay the fears and deal with the threats associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents...
Reputation systems offer web service consumers an effective solution for selecting web service providers who meet their Quality of Service (QoS) expectations. A reputation system computes the reputation of a provider as an aggregate of the feedback submitted by consumers. Truthful feedback is clearly a pre-requisite for accurate reputation scores. However, it has been observed that users of a reputation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.