Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In cloud service over crowd-sensing data, the data owner (DO) publishes the sensing data through the cloud server, so that the user can obtain the information of interest on demand. But the cloud service providers (CSP) are often untrustworthy. The privacy and security concerns emerge over the authenticity of the query answer and the leakage of the DO identity. To solve these issues, many researchers...
Cloud-based data storage is a popular cloud services. It can alleviate data management burden of data owner. However, after data file is transferred to the cloud, data owner is not able to physical dominate these outsourced data file. To efficiently ensure these data intact, several ReD-based integrity checking schemes were presented to ensure data integrity. Due to periodical checking, many data...
Vehicles can be considered as a specialized form of Cyber Physical Systems with sensors, ECU''s and actuators working together to produce a coherent behavior. With the advent of external connectivity, a larger attack surface has opened up which not only affects the passengers inside vehicles, but also people around them. One of the main causes of this increased attack surface is because of the advanced...
We present a rational approach to the construction of the information security systems (ISS) in the field of distributed systems (DS). We analyze the existing DS from the point of security and construct a two-level hierarchy of models. Such approach allows us to separate the abstraction (architecture) level and the concrete (component) level of ISS. The core set of methods, i.e. authentication and...
SCADA (supervisory control and data acquisition) systems are increasing rapidly in the terms of uses and deployments in real time industrial processing, approximately all over the world. To fulfill, the underlying advanced acquirements of industrial process; the SCADA systems are gaining and deploying more advance features for infrastructural developments, from arena of information technology (IT)...
Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets...
In recent years more and more studies are focused on trust management of vehicle ad-hoc networks (VANETs). However, little attention has been given to the issue of location privacy of the existing trust methodologies in the literature. Although traffic safety remains to be the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither of them can be ignored. In...
We apply a kind of data origin authentication algorithm that is robust against data packet loss and injection to the video multicast communication. In this algorithm, we combine the efficient packet-injection resistant multicast source authentication protocol (EPJRSA) with the Signature Amortization using Rabin's Information Dispersal Algorithm (SAIDA) to make sure that both the data and the authentication...
In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between two peers is insecure and peers create a temporary session while exchanging data. When peers exchange highly confidential data in an eHealth network over an insecure communication link,...
Many results have been published in the literature based on performance measurements obtained from simulations of vehicular networks (VANETs). These simulations use as input traces of vehicle movements that have been generated by traffic simulators which are based on traffic theory models. To our knowledge, no one has published any work based on actual large-scale recordings of vehicle movements....
As growing number of real-world activities are performed through Internet connected services, there are increasing needs to make the behaviors of both service consumer and provider accountable. Many efforts attempting to regulate services and to guarantee service qualities lack sufficient accountability support. This paper treats accountability as a service and proposes a novel contract-based accountability...
The third generation network which is vigorous nowadays will be followed by an all-IP infrastructure referred to as Next Generation Networks (NGN) in the near future. More specifically, the IP Multimedia Subsystem (IMS) is the only standardized way to offer IP based services that are enabled by one common core and all types of access networks and devices. The heterogeneity and mobility of the IMS...
Many issues need to be resolved before applying biometrics technology to the national network. Most importantly, it should be implemented with a standard interface so that interoperability can be guaranteed. Based on this requirement, infrastructure with a well-established model should be developed. The model is proposed by arranging models suitable for use in the national infrastructure establishment...
IEEE802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in IEEE802.11, IEEE introduced 802.1x for authentication and key management. IEEE802.1x is a port based network access control protocol that uses extensible authentication protocol (EAP) at the transport layer.IEEE802.1x defines authentication...
In this paper we describe an extension of the Shibboleth (Internet2 federated identity management middleware) model that allows different Service Providers (SP) to manage the shared user profiles. Such profiles may be shared among multiple instances of the same SPs (e.g. multiple digital libraries) or by several different SPs (e.g. a digital library and an educational portal). The XML-encoded profiles...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.