The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
HTTPS has become a vital component of the WWW ecosystem. However, today's application-layer middleboxes in the cloud are largely “blind” to HTTPS traffic. We propose a novel system infrastructural solution, called CloudEye, that allows middleboxes to selectively manipulate HTTPS traffic. A key design philosophy of CloudEye is to hide all the complexity from client and server applications (thus being...
We propose a server-based approach to manage a general-purpose graphics processing unit (GPU) in a predictable and efficient manner. Our proposed approach introduces a GPU server task that is dedicated to handling GPU requests from other tasks on their behalf. The GPU server ensures bounded time to access the GPU, and allows other tasks to suspend during their GPU computation to save CPU cycles. By...
Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first...
Checking data integrity remotely is of essential significance in cloud storage. It enables customers to check if their remotely stored information is intact or not without downloading the entire information. Out of two main focuses, we propose a remote information integrity checking model: ID-DPDP (personality based conveyed provable information ownership) in distributed-cloud storage. The conventional...
The OPC Classic protocol is commonly applied in Industrial control systems, which greatly improve the efficiency of data sharing and introduced in security threats at the same time. With the emergence of new viruses and attacks, aggressive behavior is often hidden in the normal OPC communication, and traditional OPC protection methods have been unable to meet the security requirements. In order to...
Cloud Computing is a framework where services are provided to the clients on pay per use basis. Many of the organizations uses cloud servers for outsourcing their sensitive data. Along with all the advantages of cloud computing there comes a threat of security of sensitive outsourced data. Cloud users cannot rely only on cloud service provider for the security reasons of the outsourced data. On that...
In a community cloud, infrastructure is shared among several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.). In such a computing model, the security responsibilities rest mostly with the third-party infrastructure provider. Security violations may occur if local access policies from different organizations are not implemented correctly. Therefore,...
The smart mobile terminals and mobile broadband communications become more and more popular. Access control systems using traditional mechanical lock, IC card authentication and password authentication technology exposes more and more security issues. This paper describes the design and implementation of server authentication module. The server system used JAVA language development and JDBC technology...
While many commercial systems as well as academic techniques for data outsourcing to and content confidentiality from untrusted data stores have been developed over the last decade, when it comes to multi-factor authentication based layered security, existing approaches typically rely on a logically centralized service. In this demo, we present DMZtore edge storage system that incorporates a decentralized...
Current Internet architecture is becoming inadequate for new requirements of highly scalable and efficient distribution of contents. Information Centric Networking (ICN) is one of the alternatives for the Next Generation Internet (NGI), which focuses mainly on contents. In-network caching is one of the major attributes of ICN, which allows contents to be cached in any ICN node. Any user can access...
In network management, when it comes to security breaches, human error constitutes a dominant factor. We present our tool topoS which automatically synthesizes low-level network configurations from high-level security goals. The automation and a feedback loop help to prevent human errors. Except for a last serialization step, topoS is formally verified with Isabelle/HOL, which prevents implementation...
In this paper, we survey access control models, protocols and frameworks in IoT. We briefly provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over the recent years (2011–2015). We stress the main challenges that would affect access control in IoT. Finally, based on our evaluation, we give hints of future research directions.
This poster presents new perspectives for open and trusted mobile applications. The Near Field Communication (NFC) radio interface is widely available for smartphones. It is usually involved in payments, access control, and transport services. We describe an open experimental platform, developed by the MOBISIM project. The prototype provides contactless payments in legacy frameworks. It comprises...
Resource discovery in special operations has been recognized as a challenging research issue. This is due to the dynamic nature of emergency intervention with its normally limited resources. We believe that the security of communications among involved parties in special operations such as military intervention missions is crucial for the success of such operations. In this paper, we develop a solution...
In service oriented computing, authentication factors have their vulnerabilities when considered exclusively. Cross-platform and service composition architectures require a complex integration procedure and limit adoptability of newer authentication models. Authentication is generally based on a binary success or failure and relies on credentials proffered at the present moment without considering...
This demo exemplifies the use of different wireless protocols, such as BLE and NFC, to manage and control multiple door locks. Each lock is able to transfer data to a router through a wireless protocol, MiWi™. The latter is connected trough an Ethernet network to a computer that manages the permissions for each lock, logging all the events.
Cloud computing is an emerging data interactive paradigm to realize users’ data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant...
The increasingly popular paradigm of Cloud computing brings about many benefits both for clients and providers, but it also introduces privacy risks associated to outsourcing data and processes to an untrustworthy environment. In particular, the multi-user computing scenario is especially difficult to tackle from a privacy-preserving point of view, seeking to protect data from different users while...
The International Standards Organization (ISO) and the European Telecommunications Standards Institute (ETSI) have defined a common ITS reference communications stack which have paved the way to new research lines in vehicular networks. Currently, most of the efforts have focused on the definition and testing of ITS applications operating over Internet Protocol version 6 (IPv6) communication technologies...
The document plays an important role in the development of cloud computing. The user obtains and shares information by the electronic document. It is rich in content and various in representations. But the challenge to security is also brought. For the secure requirement for document in cloud, firstly, we will propose a novel user-based document secure management mechanism which introduces the re-encryption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.