The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
E-Assessment is an innovative form for the evaluation of learners' knowledge and skills in online education, as well as in blended-learning environments, where part of the assessment activities is carried out online. As e-assessment involves online communication channel between learners and educators, as well as data transfer and storage, security measures are required to protect the environment against...
Cloud virtualization technology is shifting towards light-weight containers, which provide isolated environments for running cloud-based services. The emerging trends such as container-based micro-service architectures and hybrid cloud deployments result in increased traffic volumes between the micro-services, mobility of the communication endpoints, and some of the communication taking place over...
In today's life, the mobile phone is an essential device for the modern human. The people play installed games in the mobile device to pass the time and express emotions. However, stand-alone off-line game may not require internet connection but pro-longed use predisposes bored. Therefore, multiplayer on-line game meets the needs of groups of human activity. In the almost multiplayer on-line games,...
Software-defined vehicular cloud (SDVC) is a novel proposal to form a cloud consisting of vehicles and to share their underutilized resource and carry out collaborative jobs. Since the research on SDVC is in its initial stage, security and privacy issues are still challenging. In this paper, we propose a security mechanism for SDVC to satisfy fundamental security requirements including authentication,...
We describe a novel key-centric processor architecture in which each piece of data or code can be protected by encryption while at rest, in transit, and in use. Using embedded key management for cryptographic key handling, our processor permits mutually distrusting software written by different entities to work closely together without divulging algorithmic parameters or secret program data. Since...
Information-centric networking (ICN) stands out as a promising solution to replace the Internet. In the ICN architecture, the content is the major element and the data name is used for routing the content, instead of the address location as in the Internet nowadays. Furthermore, it is desirable to cache as much data as possible near the user, aiming to improve performance and reduce data transfer...
Location Base System (LBS) is considered one of the most beneficial technologies in our modern life, commonly imbedded in varies devices. It helps people find their required services in the least amount of time based on their positions. The users submit a query with their locations and their required services to an un-trusted LBS server. This raises the flag of user privacy where the user has to have...
Monitoring and encryption are essential to secure today's computer networks. Monitoring network traffic data can be especially useful to protect against data exfiltration by detecting signatures in file metadata to identify especially sensitive files that should not be publicly released. Encryption restricts the visibility of signatures, but this may be needed because some signatures used to protect...
Security is one of the key issues on Session Initial Protocol (SIP) based Internet multimedia communication system, and there are various SIP attacks which have employed forged source addresses. Combining the SIP architecture and source address validation, we propose a new SIP security architecture, including a new security framework, a two-way authentication algorithm and an IBS based identity security...
Security attributes of a Vehicular ad hoc network (VANET) include confidentiality, integrity, authentication, non-repudiation (liability), revocation and privacy. Privacy, having characteristics opposing to the rest of the attributes, makes design of a security architecture quite difficult. A commonly used solution is to have a large number of temporary certificates (i.e., pseudonyms) to achieve these...
In this paper we propose a four-stage design approach towards securing a VANET architecture with an improved PKI structure. The new PKI structure helps in keeping the users autonomous, whilst achieving the security alongside. Communication between the central certificate authority is minimized by employing self authorization by the users. This is attained by self generation of pseudonyms. This scheme...
Most of the current research and development results dealing with security of mobile agents describe solutions only for usage of mobile agents. These contributions usually assume agents posses unique and recognizable identities, cryptographic keys, assigned assurance level, and various other security parameters. But, very few papers describe how to create, classify, and evaluate mobile agents before...
Mobile agents are active objects that can autonomously migrate in a heterogeneous network to perform tasks on behalf of their owners. Mobile agents also raise several security issues related to the protection of host resources and the data carried by an agent itself. In this paper, we present a framework which is concerned with creating Web-based services for virtual learning environment (VLE) related...
Following the trends of our era, Games At Large IST Project introduces an innovative platform for running interactive, rich content multimedia applications over a wireless local area network. Games@Large project's vision is to provide a new system architecture for interactive multimedia which will enhance existing CE devices such as, set top boxes (STB), small screen and other devices, which are lacking...
This paper proposes a security framework with strong non-repudiation and privacy using new approach of ID-based cryptosystem in VANETs. To remove the overheads of certificate management in PKI, security frameworks using an ID-based cryptosystem are proposed. These systems, however, cannot guarantee strong non-repudiation and private communication since they suffer from the inherent weakness of an...
As an important new paradigm for distributed computing, the mobile agent (MA) technology has a lot of potential applications in practical fields. However, the success of MA depends on its security. The common important problem of all existing security solutions in MA system is secure key management. This paper presented the key management tree architecture provided by core hardware module of trusted...
Secure provenance techniques are essential in generating trustworthy provenance records, where one is interested in protecting their integrity, confidentiality, and availability. In this work, we suggest an architecture to provide protection of authorship and temporal information in grid-enabled provenance systems. It can be used in the resolution of conflicting intellectual property claims, and in...
The paper introduces the structure of the EPC network, analyzes the potential security problems of the EPC network information service (EPCIS). Expatiates the light PKI EPCIS trust model based on PKI, the proposed light PKI trust architecture is much simpler and efficient. Put forward a based on the enterprise trust and collaboration model (ETCM) and the search algorithm of the trust corporate relations...
In this paper, we propose an Efficient Certificate Management scheme for Vehicular networks (ECMV). The proposed scheme offers a flexible interoperability for certificate management in different administrative authorities, and an efficient way for any On-Board Units (OBUs) to update its certificate anywhere at anytime. In addition, an efficient time-limited certificate revocation for OBUs is introduced...
Personal network federation (PN-F) aims to provide secure interactions between a subset of devices of different personal networks (PN) for achieving a common goal or providing some services in collaborative environments. Security and privacy is one of the major concerns in the development and acceptance of PN-F like collaborative networks and as any other security architecture, the key management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.