The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper explores methodologies, advantages and challenges related to the use of the Information Centric Network technology for developing NoSQL distributed databases, which are expected to play a central role in the forthcoming IoT and BigData era. ICN services make possible to simplify the development of the database software, improve performance, and provide data-level access control. We use...
Software Defined Security (SDS), which provides a flexible and centralized security solution, attracts many researchers to study the details of this conception. In this paper, a security controller-based SDS (SC-SDS) architecture is presented, in which a modularized security controller is placed in the control plane and interacts with other components through APIs. The security controller completes...
This paper introduces a surveillance system that can be deployed in various environments such as home security or child protection. It takes the advantage of video sharing platforms like YouTube to provide live streaming to the end users free of cost. Any user can create live events via this application anywhere on the fly. This system is mainly an Android based application that can harness 3G/HSPA...
Distribution of smartphone apps represents a major risk for tomorrow. Alternative app stores filled by pirated content create a dangerous substrate for the diffusion of tricky apps. We present in this paper a dedicated Crawling Engine conceived to protect distribution of genuine apps.
Recent developments favor the adoption of IP-based protocols in automotive and aerospace domains. The increased connectivity between components helps to cut costs and enables better re-use of standardized components. However, increased connectivity also increases the attack surface of the overall system and necessitates dedicated security solutions. This paper presents an anomaly detection system...
We present ENTRADA, a high-performance data streaming warehouse that enables researchers and operators to analyze vast amounts of network traffic and measurement data within interactive response times (seconds to few minutes), even in a small computer cluster. ENTRADA delivers such performance by employing a optimized file format and a high-performance query engine, both open-source. ENTRADA has been...
While cyber-physical systems are widely deployed and known to be difficult to analyze due to their increasing complexity, the number of sophisticated attacks against them have been constantly growing. This necessitates semi-automated intrusion response and recovery capabilities for timely termination of ongoing attacks and effective recovery of the infrastructural normal and safe operations. In this...
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented sufficient security strategies and components for their networks yet. Additionally, tablets, smartphones, and netbooks changed the requirements of IT security...
Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. Global VoIP security threats are analyzed by studying several millions of...
Security has been a major concern in computer sciences for a long time. However, the definition and the enforcement of a complete security policy are difficult tasks, requiring deep knowledge of the inner workings of the security mechanisms. The management of the security is even more complex in a system such as a Cloud, which is a heterogeneous environment, with multiple applications and tenants...
This demo presents a Security Service Level Agreement (SSLA) management solution for the cloud. In this work we aim to bind security in the Service Level Agreement (SLA) as a measurable and agreeable parameter between cloud service provider (CSP) and the customer. To achieve this, we allow cloud customer to choose between different security levels when negotiating the SLA and then our automated SLA...
The use of Android platform based mobile terminals has been growing high. On the down side, the number of attacks by malicious application is also increasing because Android platform is vulnerable to private information leakage. These malicious applications are easily distributed to users through open market or internet. An attacker inserts malicious code into mobile app which could be harmful tool...
With great advances in mobile devices, e.g., smart phones and tablets, location-based services (LBSs) have recently emerged as a very popular application in mobile networks. However, since LBS service providers require users to report their location information, how to preserve users' location privacy is one of the most challenging problems in LBSs. Most existing approaches either cannot fully protect...
Validation of configuration and security compliance at the time of creating new service is an important part of service management process and governance in most IT delivery organizations. It is performed to ensure that security risks, governance controls and vulnerabilities are proactively managed through the lifecycle of the services, and to guarantee that all discovered problems and issues are...
This paper researched computing node and server's configuration and mathematical formula's process based on MathJax. Considering the importance of internet to the development of mathematics and sciences, we introduced MathJax to provide an excellent solution to display formulas. We mainly focused on: Principle and innovation of MathJax; Multiple comparison around plugin, image simulation, Mathematical...
Service Integration has become a critical issue as organizations find a greater need to consistently interact with their partners and share their Business logics to carry out the necessities. To accurately and efficiently extract and integrate the required service logics from the rapidly expanding Business services, developers need to empathize the whole service and must decide on proper approach...
At present, the complexity of input and unverified assumptions about other components of the rich web applications is a problem requesting much more attention. Most client-side applications are designed without the full consideration of input validation. These issues can cause a new class of web threats. To deal with the security issues above, we classify and highlight a new class of vulnerabilities...
Increasing amount of data and demand to process and analyze them induces enterprises to employ alternative computing paradigms to overcome computing capacity shortages. Cloud Computing is a new emerged computing approach that promises scalability of resources, on-demand availability and pay-as-you-go economic model instead of heavy investment on IT resources. However, to decide on choosing Cloud as...
Business metrics play a critical role in determining the best system-level configuration to achieve an organizational business-level goal. We present a framework for reasoning about business-level implications of malicious attacks affecting information technology (IT) systems that underlie various business processes. Through an exemplar web-based retail company scenario, we demonstrate how to quantify...
Server consolidation through virtualization is becoming an effective way to save power and space in enterprise data centers. However, it also brings additional operational risks for the consolidated system because the impacts of hardware failures, human errors, and security breaches can be vastly magnified in that densely packed environment. In order to mitigate the above issues, this paper proposes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.