The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based...
In this paper, we have formulated a solution for proxy usages in a network. We all are surrounded with digital signatures around us, we just need to filter those to make our network clean, secure, efficient. Is what we did in this research work. There is also a great need of load optimization at different points in the network. We have proposed a way to use machine learning and neural networks to...
The OPC Classic protocol is commonly applied in Industrial control systems, which greatly improve the efficiency of data sharing and introduced in security threats at the same time. With the emergence of new viruses and attacks, aggressive behavior is often hidden in the normal OPC communication, and traditional OPC protection methods have been unable to meet the security requirements. In order to...
In a community cloud, infrastructure is shared among several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.). In such a computing model, the security responsibilities rest mostly with the third-party infrastructure provider. Security violations may occur if local access policies from different organizations are not implemented correctly. Therefore,...
An algebra is proposed for constructing and reasoning about anomaly-free firewall policies. Based on the notion of refinement as safe replacement, the algebra provides operators for sequential composition, union and intersection of policies. The algebra is used to provide a uniform way to specify and reason about OpenStack host-based and network access controls, in particular, security group and perimeter...
The accountability of private data authority is the main issue that owners always concern and look for the good way to solve it, particularly in the cloud computing services era nowadays. On-demand service of cloud computing allows users to access the data anytime, anywhere from any sources but such access need to be in limitation. Cloud computing presents a level of risk because fundamental services...
The specification and verification of access control policies are fundamental steps in the process of securing industrial control systems and critical infrastructures. The focus of this paper is on bridging the semantic gap between high-level access control policies specified in the Role-Based Access Control (RBAC) framework and the low-level security mechanisms actually implemented in the physical...
The enlargement of the current enterprise network scale makes the conflict between application systems and network devices inevitable. To address this issue, this paper proposed a verification method of network reach ability based on topology path. Our approach extracts communication need of application systems through formalization method, so the problem of whether the communication need will be...
As the number and variety of applications and workloads moving to the cloud grows, networking capabilities have become increasingly important. Over a brief period, networking support offered by both cloud service providers and cloud controller platforms has developed rapidly. In most of these cloud networking service models, however, users must configure a variety of network-layer constructs such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.