The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Managing large volume of devices in machine-to-machine systems and large scale cyber-physical systems with least effort is a challenging and critical issue. In this work, we design and implement an out-of-box device management to automatically add and remove devices from the system, based on the connectivity. While the devices can be managed automatically, the security and privacy issues are both...
In this paper, we present the design and implementation of an active storage framework for object storage devices. The framework is based on the use of virtual machines/execution engines to execute function code downloaded from client applications. We investigate the issues involved in supporting multiple execution engines. Allowing user-downloadable code fragments introduces potential safety and...
This paper presents JavaSPI, a "model-driven" development framework that allows the user to reliably develop security protocol implementations in Java, starting from abstract models that can be verified formally. The main novelty of this approach stands in the use of Java as both a modeling language and the implementation language. By using the SSL handshake protocol as a reference example,...
We developed the first open source Path Computation Element (PCE) emulator, which includes a complete PCEP protocol implementation, network I/O support and support for concurrent path computations. We share the lessons learned in its implementation.
Software agents are a promising computing paradigm. Scientific community has devoted important efforts to this field [1]. Indeed, several important applications exist based on this technology. Despite of their benefits, the lack of the appropriate security mechanisms for agent based systems represents a barrier for the widespread use of this technology. Additionally, the application of the current...
Agent-based computing represents a promising paradigm for distributed computing. Unfortunately the lack of security is hindering the application of this paradigm in real world applications. The protection of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In this paper we provide a mechanism that aims to solve the problem of the malicious hosts....
With the availability of high performance networks and the increase in the number of online scientific instruments, remote instrumentation is a topic with much popularity lately, promising better instrument utilization, easier collaboration between distant organizations and diminution of travel-related costs and overhead. At NRC we needed a simple and secure method for researchers to remotely access...
With the progress of researches on the integration of Geographic Information System (GIS) and Remote Sensing (RS), digital earth, and information sharing, to publish RS images on Internet has become a significant research work. This paper presents an efficient algorithm to build image pyramid model for convenient data storage and retrieval and proposes two distributed cutting algorithms under the...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web-services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate. In this paper, we describe the design and implementation of such a framework, called...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.